Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets, (ii) analyze the migration cost, (iii) when a hacker enters the network, the details of the hacker is send to the GPS to identify hackers location, (iv) provides the user requested packets back to the user without any modification. GPS work is to identify the hacker location in which node they are trying to access the files and that information has been sent to the user where hacker enters the network. Each packet sent by the service provider via router to end-user, the router intimates service provider with a confirmation message. Finally, VAN router provides security to the end-user by avoiding hackers to access the file and minimizes traffic cost, finds shortest path.
[1]
S. Karthik.
Underwater Vehicle for Surveillance with Navigation and Swarm Network Communication
,
2014
.
[2]
Sofie Pollin,et al.
Analysis of Harmful Interference to and from Aerial IEEE 802.11 Systems.
,
2015,
DroNet@MobiSys.
[3]
Jiwa Abdullah,et al.
Enhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
,
2017
.
[4]
Sofie Pollin,et al.
Micro aerial vehicle networks: an experimental analysis of challenges and opportunities
,
2014,
IEEE Communications Magazine.
[5]
Myounggyu Won,et al.
On Optimal Connectivity Restoration in Segmented Sensor Networks
,
2013,
EWSN.
[6]
Evsen Yanmaz,et al.
Trajectory-aware Ad hoc Routing Protocol for Micro Aerial Vehicle Networks
,
2014
.
[7]
Stephan Sand,et al.
Application-driven design of aerial communication networks
,
2014,
IEEE Communications Magazine.