Design and develop an eco with secure layered architecture for MANETS

Emerging Mobile Based Technology (MANET) gives Revolutionary Changes in the computer world. As research has moved, several prospects has been explored and yet more to be explored. MANET is based on IEEE 802.11. In MANET, the important thing is that all the nodes are mobile and due to this, it is hard to secure the communication. Power saving is also a major problem in MANET because mobile nodes work on battery. As various societies' work on reducing energy consumption in MANETs and techniques like clustering are proposed for measurement of energy utility. Architecture is proposed which provides energy saving with secure communication. It includes coverage of several protocol layers that are physical, Network, Transport and Presentation layer. This paper first concentrates on physical layer and tries to shorten the path length for less consumption of battery or power. Next layer works on both the aspects that is power saving and secure communication using in various ways. The last layer concentrates mainly on secure transmission. A comparison between architecture models is also discussed in this paper.

[1]  Karim Konate,et al.  Attacks Analysis in Mobile Ad Hoc Networks: Modeling and Simulation , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[2]  Suresh Singh,et al.  PAMAS—power aware multi-access protocol with signalling for ad hoc networks , 1998, CCRV.

[3]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[4]  G. S. Mamatha,et al.  A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND CORRECT MISBEHAVIOUR IN ROUTING , 2012 .

[5]  Ahmed Yahya,et al.  Energy-aware architecture for multi-rate ad hoc networks , 2010 .

[6]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[7]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[9]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[10]  Yu-Chee Tseng,et al.  An architecture for power-saving communications in a wireless mobile ad hoc network based on location information , 2004, Microprocess. Microsystems.

[11]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[12]  Mohammad Ubaidullah Bokhari,et al.  TPL: NOVEL Efficient Threshold Power Consumption Scheme on MANET , 2012 .

[13]  S. C. Sharma,et al.  A Highly Secured Approach against Attacks in MANETS , 2010 .

[14]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.

[15]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .