Fast and Secure Routing Protocol in MANET

α
vivek anand singh
vivek anand singh
σ
Vineet Yadav
Vineet Yadav
α Dr. A.P.J. Abdul Kalam Technical University

Send Message

To: Author

Fast and Secure Routing Protocol in MANET

Article Fingerprint

ReserarchID

CSTNWSZP362

Fast and Secure Routing Protocol in MANET Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

This paper proposes an enhanced mobile ad-hoc routing protocol FSR (Fast and Secure Routing), which is enhanced version of best features of ZBR (Zone Based routing Protocol). FSR deals with speed and security both at the same time. The ZBR enhances the speed of the network whether TCP has provided the primary means to transfer data reliably across the Internet. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Early detection protocols have tried to address this problem with a user-defined threshold, the finding of detecting and removing compromised routers can be thought of as an instance of anomalous behaviour based intrusion detection. That can be the compromised router can that identified by correct routers when it deviates from exhibiting expected behaviour. This protocol can be evaluated in a small experimental network.

References

16 Cites in Article
  1. Charles Perkins,Pravin Bhagwat (1994). Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers.
  2. C Cheng,R Riley,Spr Kumar,J Garcia-Luna-Aceves (1989). A loop-free extended Bellman-Ford routing protocol without bouncing effect.
  3. S Murthy,Garcia-Luna-Aceves Jj (1996). An Efficient Routing Protocol for Wireless Networks.
  4. G Kumar (2010). Unknown Title.
  5. P Humblet (1991). another Adaptive Distributed Shortest-Path Algorithm.
  6. B Rajagopalan,M Fairman (1991). A new responsive distributed shortest-path rounting algorithm.
  7. R Thomas (2003). supp1-3180763.pdf.
  8. K Bradley,S Cheung,N Puketza,B Mukherjee,R Olsson (1998). Detecting disruptive routers: a distributed network monitoring approach.
  9. A Mizrak,Y.-C Cheng,K Marzullo,S Savage (2006). Detecting and Isolating Malicious Routers.
  10. L Subramanian,V Roth,I Stoica,S Shenker,R Katz (2004). Listen and Whisper: Security Mechanisms for BGP.
  11. S Kent,C Lynn,K Seo (2000). Secure Border Gateway Protocol (S-BGP).
  12. Yih-Chun Hu,Adrian Perrig,David Johnson (2002). Ariadne:.
  13. B Smith,J Garcia-Luna-Aceves (1996). Securing the border gateway routing protocol.
  14. S Cheung (1997). An Efficient Message Authentication Scheme for Link State Routing.
  15. M Goodrich (2001). Efficient and Secure Network Routing Algorithms.
  16. R Perlman (1988). m of ona itoring is therefore an important component as US$5,while the importin real-ti nmyedm ro oungih to t rin p g re p m ar eetdhnoedsssuss tr eadt eg iines. Ke TnhyeatbiamgesofasmhaiigzheadsurU in S g $ 2a0dw ro g price fo it uhg in htapsepra io rdtihse so sa mmee ­ d n (d eip sc eunsdselda rg aeb ly ovoen ). th Seom raingauge network design three months. Such drought industries omftuwsotb to eisnucclhudreedc or sdas te l h li atvee -d enro iv t ed e rece be erna in cfaanltl me libr eas te ti t m ho a ds have discouraged. rainfall es d fo te r s , pob in utt8dFiiangannocsiiasl , prreesdoiucrtcieosn , faonrdddrroouugghhttpm re opnairteodrn in es g s , t to hreingg lo bmaettih mates in Kenya. Other drought moni­ are limited in Kenya. Kenya has, however, 3 Efficient lccoloi ds de mmm at uenc pend ic eanttiroeson (e . cgl . i , mEaN te SpO ro ducts from invested heavily in meteorological training, edu­ for the collection, dis n facilities ar feo re re ca qsutisr ) e . d9cTa im tio e n ly , an a d va bia la si bcilfia ty c ilit o ie f s. drought products and ndeattwa/ o in rk fo irsm ation. Th seemaivnaaitliaobn le , acnodmem xc uhnaincgae ti oonfm ser e v te ic oerso lo fr g o ic m al g se lo rv bia ce lsc in li mtahtee re cgeinotn re s r el Myaonny4pRreespeaarrecdh nes nsoatndadeeaq rl uyaw te arfnoirng an syesftfeem ct . ive drought tdhreo ug d h ev tea lo dpve is d o ri w es orflrdo . m Su th cehcp li r m od at uectcsenitnrcelsudoefadcrto io ungsh . t pr ios ce re s q se usira ed to understand the complex ENSO advisories and global circulation data. very limi R te edso in urK ce esnyfaon . rdm th e e te ir orsoolcoigoieccaolnroem se iacrcihntaerre ­ S tim uc e h . iTnh fo erm in a st t a io ll n a ti is onsoomfetth im eensewnoitntaecrcneestsifbalceilo it ny5D re rqouu ir geht sp m ec oinailtoe ri qnugiyp diagnosis, and predic at the Kenya Meteorological Department will facilities including s ment and high techno t lo io gny 10 A sig nne if diu ca cnattleyd im an pdrowveellt -h iinsfoprrm ob eldem pu . blic is likely to 6 p Sk uitle le rs d , hwuhm ich are limit peedciianlK in esnty ru a m . ents and com­ rceastp io onndanbdetttrearin to in agnyofntehweppoulbilciyc, / mmeatnhaogdesr . s , Eadnud ­ tHhue ma mnulrte id so iasn ci prleisnoaurryc es di a m re e n required in handling policy makers is an important component of any ological conc uerpctessof fo drrohuagnhdtliansg io n th seo ba f s ic drm ou e ghts. drought preparedness strategy. This has not been However, they need speci re available in Ke tneyoa r­ . coopm tim pl u ex mmiunl ti K di esncy ip a l , ineasrpyed ci raolu ly ghitn in ltiegrhatc ti oofnst . he ecfofm ec p ti o vely address the co amltprlaeixn in mgutlo ti d b is eciapb li lneatroy 11 iSnttrruocdtuuc ra ed laadnjeuw st m di e m nt eno si fon th ientW he orrledgiB on ansk in ce haist7M ba iss ic mcahnaeln le ts that could be required to address the discourages government subsidy, which has been a mation n ag henm ge esntofadn ro dugahbtupsree pa orfeddnreo ss ave u . ght infor­ pmraojvoirdipnogst-bdarso ic u gh fo toedmeirng en tchye re dlr ie ofug st hrta -t setg ri yckfeonrpdo ro li u ti gch al t , in afnod rm baete io nnohbasse rved in some cases when region. The method was adopted during the citizens, dono rs o , ther gai b ns e en byu se sdom fo ereicnodn iv oim du ic al , A dr cotuognht28ofJ1 an 9u9a6r -y 71b9y9i7n . v W ok iitnhgou th teem Pu e b rg li ecnSceycfuoro it dyh general public. Inansdomoe th ecrasseast , tdhreouegxh pe tnasdeviosfortiheesrceolm ie mfoadnid ti es g ov in e rn t m he e nt dr souubgsh id t-ys tr o ic n k en b asi rce gi foonosd , cmo av memboedein ti eas bu an sed through hoarding of essential including provision for subsidised seed prices when aft aerrkertecweiitvh in in gaidnffeow int rmm rod a o ti n u th ci sng at thhiekm ed bpa ri cckes to the the rains started, the impacts of the 1996-7 experience drought with oinn that one countr . yEw ve il n l dro Iutgm ht aywobueldcohnacvleubdeeedntvheartyadle th va osutg at h in K g. enya has cdoounnotrrsyhatvoebeexepn known to caon fe ti wnumepornetshssi , ngso th maetm an i tt ieneteu rm nd in eirs te th ri ealod ff iiscaes te orfm th aenapgreem sid eenntt, co a m nd ­ fmuinndisma fo l prices boyrtgu th ar e a ir n te gerianigntrheesye rv weis ll p at r ov viedreyvm id aenyreo le th va enrtm se in citsotrearliadl ro su ubgchotm in m fo it rtm ee ast io th nattoptrhoe ­ export pr ricgerafionra im b p ag oro ts f m in aiczaese is o so f m dr e o ti umgehstsa . s T lo hweiann te irnm te in girsa te te r d ia lna co tu m ra mlitdtiesea , stK er epnryeapadroeedsnensostphoa li vcey.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

vivek anand singh. 2013. \u201cFast and Secure Routing Protocol in MANET\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E4): .

Download Citation

Issue Cover
GJCST Volume 13 Issue E4
Pg. 41- 44
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

April 18, 2013

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 9899
Total Downloads: 2670
2026 Trends
Related Research

Published Article

This paper proposes an enhanced mobile ad-hoc routing protocol FSR (Fast and Secure Routing), which is enhanced version of best features of ZBR (Zone Based routing Protocol). FSR deals with speed and security both at the same time. The ZBR enhances the speed of the network whether TCP has provided the primary means to transfer data reliably across the Internet. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Early detection protocols have tried to address this problem with a user-defined threshold, the finding of detecting and removing compromised routers can be thought of as an instance of anomalous behaviour based intrusion detection. That can be the compromised router can that identified by correct routers when it deviates from exhibiting expected behaviour. This protocol can be evaluated in a small experimental network.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Fast and Secure Routing Protocol in MANET

Vivek Anand Singh
Vivek Anand Singh Dr. A.P.J. Abdul Kalam Technical University
Vineet Yadav
Vineet Yadav

Research Journals