Email-ID
Password
Forget password?






New User Registration
%20%20%20%20Secured%20Unicast%20Routing%20using%20Cross%20layer%20design%20in%20Wireless%20Mobile%20Ad%20Hoc%20Networks
Article
  

Secured Unicast Routing using Cross layer design in Wireless Mobile Ad Hoc Networks


N Kirubakaran and A.Kathirve

1 Department of Computer Science Engg. St. Peter’s Univeristy, Sankar Nagar,Avadi, chennai, India.
2 Department of Computer Science Engg. Misrimal Navajee Munoth Jain Engineering College, Chennai, India,


A.Kathirvel,
Email:

Received: February 25, 2017,   Accepted: March 27, 2017,   Published:


Abstract:

A wireless mobile ad hoc network is a dynamic wireless network with the engagement of cooperative nodes with a infrastructure less networks. Multicasting routing is intended for group communication that supports the dissemination of information from a sender to all the receivers in a group. Problems in ad hoc networks are the scarcity of bandwidth, short lifetime of the nodes due to power constraints, dynamic topology caused by the mobility of nodes. We would like to provide solution for the above problem using the cross layer approach. In a cross-layer design, where the medium access control layer functionality and the network layer functionality are performed by a single integrated layer. The basic design philosophy behind the multicast routing part of the architecture is to establish and maintain an active multicast tree surrounded by a passive mesh within a wireless mobile ad hoc network. Thus, the multicast backbone is a condensed passive mesh woven around a highly pruned tree. Although tree-based and mesh-based multicasting techniques have been used separately in existing multicasting architectures, the novelty in this study is the integration and reengineering of the tree and mesh structures to make them highly energy efficient and robust for real-time data multicasting in mobile ad hoc networks. Energy efficiency is achieved by enabling the nodes to switch to sleep mode frequently and by eliminating most of the redundant data receptions. Extensive simulation studies using Network Simulator helps to study the proposed solution soundness and prove the robustness of the system.


Keywords: Wireless network Computing, Privacy Preservation, Data,Tiered Blind and Anonymous Hierarchical Identity Based Encryption (TBAHIBE) and Location Based Keyword Query Search (LBKQS), Electronic Health Record (EHR).


Citation:

A.Kathirvel, et al. (2017). Secured Unicast Routing using Cross layer design in Wireless Mobile Ad Hoc Networks. J. of Computation in Biosciences and Engineering. V3I3. DOI: 10.15297/JCLS.V3I3.03


Copyright:

© 2017 A.Kathirvel. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


      
Download PDF

      Journal of Computation in Biosciences and Engineering