PARTICLE SWARM OPTIMIZATION ALGORITHM (PSO) USED FOR SECURITY ENHANCEMENT IN MANET

Dr R VADIVEL

Abstract


The Mobile ad hoc network (MANET) is become very famous due to their fixed infrastructure-less quality and dynamic nature. it contains a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because it does not contain any infrastructure.MANET is frequently changing its topologies to transfer the data quickly, because nodes in this network are moving always (mobility) and data transfer has been done by finding the efficient routing path between source and destination. These types of attacks affect the MANET routing path and it hence it is necessary to secure routing. ALERT protocol is evolved which is Distinguished by its low cost due to randomized routing mechanism and anonymity protection for sources, destinations, and routes. PSO is a population based optimization technique use for finding optimum solution. PSO technique is originated from social behavior bird flocking. In PSO optimum solution is obtained from the behavior of bird. Since PSO uses for network centric localization purpose, this approach generates network navigational decisions by obviating centralized control thereby reducing both the congestion and delay.

Keywords


PSO, denial of services, TCP

Full Text:

PDF

References


PRESTO: A Predictive Storage Architecture for Sensor Networks. Peter Desnoyers (2005).

Verifiable Privacy-Preserving Range Query in Two-tiered Sensor Networks. Bo Sheng and QunLi (2006).

Verifiable Privacy-Preserving Range Query in Sensor Networks ( Bo Sheng and Qun Li).

A Privacy-Preserving Index for Range Queries (BijitHore, Sharad Mehrotra2009)

Top-k Query Result Completeness Verification in Tiered Sensor Networks Chia-Mu Yu, Guo-Kai Ni (2014).

Secure Top-k Query Processing in Unattended Tiered Sensor Networks Rui Zhang (2014).

Micro Hash: An Efficient Index Structure for Flash-Based Sensor Devices DemetriosZeinalipour-Yazti.(2012).

Inference Attacks on Property-Preserving Encrypted Databases (Muhammad Naveed 2015.

Secure Range Queries in Tiered Sensor Networks (Jing Shi, Rui Zhang, and Yanchao Zhang 2009).

Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network

(Xiaoping Liao ,Jianzhong Li 2009) .

W. Adjie-Winoto, E. Schwartz, and H. Balakrishnan, The Design and Implementation of an Intentional Naming System, In Proceedings of the Symposium on Operating Systems Principles, (Charleston, South Carolina, December 1999).

P. Bonnet, J. Gehrke, and P.Seshadri, Querying the Physical World, In IEEE Personal Communications Magazine, Special Issue on Networking the Physical World, (October 2000).

P. Bose, P. Morin, I. Stojmenovi´c, and J. Urrutia, Routing with Guaranteed Delivery in Ad Hoc Wireless Networks, In Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications(DialM '99), (Seattle, Washington, August 1999).

N. Bulusu, J. Heidemann, and D. Estrin, GPS-Less Low Cost Outdoor Localization for Very Small Devices, In IEEE Personal Communications Magazine, Special Issue on Smart Spaces and Environments, (October2000).

A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, Habitat Monitoring: Application Driver for Wireless Communications Technology, In ACMSIGCOMM Workshop on Data Communications in Latin America and the Caribbean, (Costa Rica, April 2001).




DOI: https://doi.org/10.26483/ijarcs.v9i2.5643

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science