KEY OPTIMIZATION TECHNIQUE IN MOBILE AD HOC NETWORKS

Shanthi Govindan, M. Ganaga Durga

Abstract


In MANET, meta-heuristic algorithm is the major role for selecting optimal route path and security. During optimal routing process the OLSR protocol is modified by using the Fruit Fly Optimization. The FFO algorithm is utilized to locate the ideal and best way to route. After choosing the optimal path Diffie-Hellman(DH) cryptography is used for secure data transmission in Mobile Ad hoc Networks. We have proposed an enhanced DH Cryptographic algorithm based on Particle Swarm Optimization Technique for improving the performance of encryption and decryption process and we have shown that Qos of proposed work is better than existing works.

Keywords


Particle Swarm Optimization, Diffie-Hellman Cryptography, Scalar Multiplication, Fruit Fly Optimization(FFO)

Full Text:

PDF

References


P. Jacquet, P. Minet, P. Muhlethaler, N. Rivierre. Increasing reliability in cable free radio LANs: Low level forwarding in HIPERLAN. Wireless Personal Communications, 1996.

Qayyum, L. Viennot, A. Laouiti. Multipoint relaying: An efficient technique for flooding in mobile wireless networks. 35th Annual Hawaii International Conference on System Sciences (HICSS'2001).

www.ietf.org/rfc/rfc3626.

Kaveh, "Particle Swarm Optimization", Advances in Metaheuristic Algorithms for Optimal Design of Structures, pp. 11-43, 2016.

Glover F, Kochenberger GA (eds) (2003) Handbook of metaheuristics. Kluwer Academic Publishers, Dordrecht

Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, vol 4, pp 1942–1948

Shi Y, Eberhart R (1998) A modified particle swarm optimizer. In: Proceedings of IEEE World congress on computational intelligence. In: The 1998 I.E. international conference on evolutionary computation

Eesti Infotehnoloogia Kolledz Diffie-Hellman key exchange Essay Sandra Netsajeva Tallinn 2009.

Tan, S., Li, X. and Dong, Q. (2015) ‘Trust based routing mechanism for securing OSLR-based MANET’, Ad Hoc Networks, vol. 30, pp. 84-98.

Sarkar, S. and Datta, R., 2016. A game theoretic framework for stochastic multipath routing in self-organized MANETs. Pervasive and Mobile Computing.pp.1-18

Zhang, M., Yang, M., Wu, Q., Zheng, R. and Zhu, J., 2017. Smart perception and autonomic optimization: A novel bio-inspired hybrid routing protocol for MANETs. Future Generation Computer Systems,pp.1-18.

Boushaba, A., Benabbou, A., Benabbou, R., Zahi, A. and Oumsis, M., 2015. Multi-point relay selection strategies to reduce topology control traffic for OLSR protocol in MANETs. Journal of Network and Computer Applications, Vol.53, pp.91-102.

Kanarachos, S., Griffin, J. and Fitzpatrick, M.E., 2017. Efficient trust optimization using the contrast-based fruit fly optimization algorithm. Computers & Structures, Vol.182, pp.137-148.

Govindan Shanthi, Meenakshi Sundaram Ganaga Durga Cognitive-based routing model with identity-based cryptography in MANET Int. J. Mobile Network Design and Innovation, Vol. X, No. Y, 200x (forthcoming inderscience publications)

G. Shanthi, M. Ganaga Durga Secure and Trusted Optimal Routing Model Using Fruit Fly Optimization for Cognitive Radio Based MANET, International Journal of Pure and Applied Mathematics Volume 118 No. 7 2018, 605-614 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)




DOI: https://doi.org/10.26483/ijarcs.v9i2.5779

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science