Skip to main content
Log in

Modified Bi-directional Routing with Best Afford Path (MBRBAP) for Routing Optimization in MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A Mobile Adhoc NETwork (MANET) is an independent wireless network in which mobile nodes can communicate with each other by forwarding the packets without support of any infrastructure. Since it is a dynamic mobile network, it cannot assure seamless packet transmission between the mobile nodes; making the open network vulnerable to various malicious attacks. MANET uses acknowledgement based schemes, for the assurance of packet transmission by overriding the malicious attacks. Since most of the existing intrusion detection systems (IDS) use two hop information for acknowledging the packets, flooding over multiple outgoing paths and acknowledgement (ACK) overhead occurs when transmitted over a long distance and finally it doesn’t have any prevention system to solve the malicious attacks. In this paper, Modified Bi-directional Routing Abstraction method is proposed to resolve these problems by reducing the ACK overhead and eliminating the malicious attacks. The Best Afford Path using cluster heads is embraced with the proposed technique which utilizes the maximum bandwidth to transfer the packets by routing the nodes around clockwise and anticlockwise routing procedures that detects and overcomes the malicious attacks with an IDS/IPS coupled mechanism. This technique utilizes the cluster heads that are used to get the ACK from the cluster nodes when the packets are sent through it. The proposed technique reduces the ACK overhead, eliminates the malicious attack, increases the bandwidth utilization and improves the delivery of packet with minimum delay compared with the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Dinesh, K. S. (2014). Routing overhead reduction and selection of stable paths in MANET. International Journal of Inventions in Computer Science and Engineering (IJICSE), 1(9).

  2. Shakshuki, E., Kang, N., & Sheltami, T. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.

    Article  Google Scholar 

  3. Li, S.-C., Yang, H.-L., & Zhu, Q.-S. (2010). Research on MANET security architecture design. 2nd International Conference on Signal Acquisition and Processing (pp. 90–93).

  4. Mustafa, H., & Xiong, Y. (2013). Routing attacks detection and reaction scheme for mobile ad hoc networks using statistical methods. Proceedings of the 22nd wireless and optical communication conference on security for wireless networks, Chongqing. 16–18 May 2013 (pp. 659–664).

  5. Gowtham, R., Fatima, C. R. G., & Gopeeka, A. Chandrasekar. (2014). An improvised intrusion detection system for MANETs—Defensive EAACK. IJARCET, 3(5), 1908–1915.

    Google Scholar 

  6. Eissa, T., Razak, S. A., & Ngadi, M. A. (2009). A novel lightweight authentication scheme for mobile ad hoc networks. AJSE, 37, 2179–2192.

  7. Agha, K. A., Bertin, M.-H., Dang, T., Guitton, A., Minet, P., Val, T., & Viollet, J.-B. (2009). Which wireless technology for industrial wireless sensor networks? The development of OCARI technology. IEEE Transactions on Industrial Electronics, 56(10), 4266–4278.

    Article  Google Scholar 

  8. Kang, N., Shakshuki, E. M., & Sheltami, T. R. (2011). Detecting forged acknowledgements in MANETs. In IEEE international conference on advanced information networking and applications (AINA) (pp. 488–494).

  9. Chang, J.-M., Tsou, P.-C., Chao, H.-C., & Chen, J.-L. (2011). CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture. In IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE) (pp. 1–5).

  10. Jain, Y. K., & Sharma, N. K. (2012). Secure trust based dynamic source routing in MANETs. International Journal of Scientific & Engineering Research 3(8), ISSN 2229-5518.

  11. Patel, M., & Sharma, S. (2013). Detection of malicious attack in MANET a behavioral approach. In IEEE International Advance Computing Conference (IACC) (pp. 388–393).

  12. Elizabeth, L. A., Prasanth, S. H., Gopesh, S., & Sankar, B. K. (2014). Enhanced adaptive acknowledgment in MANET’S with clustering. International Journal on Recent and Innovation Trends in Computing and Communication, 2(4), 900–906.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Malathi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Malathi, M., Jayashri, S. Modified Bi-directional Routing with Best Afford Path (MBRBAP) for Routing Optimization in MANET. Wireless Pers Commun 90, 861–873 (2016). https://doi.org/10.1007/s11277-016-3233-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3233-9

Keywords

Navigation