vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff3a0e2a000000d4a2020001000200 Routing is challenging issue in WSN: Cryptography and key management schemes seem good, but they are too expensive in WSN. Prevention-based and detection based are the two approaches that are used in MANET. In prevention-based approaches a centralized key management is required, These applications require a good Quality of Service (QoS) from sensor networks, such as, minimum percentage of sensor coverage in the required area, continuous service during required time slot with minimum (or limited) resources (like sensor energy and channel bandwidth) and minimum outside intervention. The whole network may be affected if the infrastructure is destroyed. So this approach is used to prevent misbehavior, but not detect malicious based routes Detection based approaches are used to detect selfish node along with route that helps to identify malicious misbehavior route. Detection based approaches are based on trust in MANETs. Hence this approach is used to calculate the trust value in trust management schemes. The proposed scheme differentiates, routes, data packets and control packets, and also excludes the other causes that results in dropping packets, such as unreliable wireless connections and buffer overflows. The proposed scheme in a MANET routing protocol, evaluation of the AODV (Adhoc on demand on distance vector) and Low Energy Adaptive Clustering Hierarchy (LEACH) protocol with the NS2 simulator.
N V Kousik1, M Sivaram2, S Kalidass3 Galgotias University, India1, Lebanese French University, Iraq2
MANET, WSN, Routing, Quality of Service, AODV
January | February | March | April | May | June | July | August | September | October | November | December |
1 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 10 , Issue: 1 , Pages: 1947-1952 )
Date of Publication :
March 2019
Page Views :
174
Full Text Views :
4
|