Securing Communication in MANET Through E-GAMAN Algorithm
Securing Communication in MANET Through E-GAMAN Algorithm
Securing Communication in MANET Through E-GAMAN Algorithm
AbstractMANET consists of mobile nodes that are in radio reach of one. Each of the nodes has a wireless interface to
correspond with one another. All networking functions, for example, routing and data transmission, are performed by nodes
themselves in an organizing toward oneself way. Because of these reasons, securing communication in MANET is extremely
difficult. In this study, we proposed an improved QoS routing algorithm for MANETs called E-GAMAN. The proposed
methodology has two algorithms: SSRA and GAMAN. Simulation results show that E-GAMAN algorithm has a great execution
and is a guaranteeing algorithm for QoS routing in MANET.
806
IJRITCC | June 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 6 806 810
_______________________________________________________________________________________________
III. MANET links are done. Next, the SSRA weighs all nodes in the
network, whether their accessible support fulfills the necessities
A MANET (Mobile Ad-hoc Network) is a collection of or not. In the event that the NAB is short of what the "Limit"
autonomous mobile nodes that can impart to one another by then the node is avoided from the ET. Overall, the node is
means of radio waves. The mobile nodes that are in radio incorporated in the ET and the following node is checked. The
reach of one another can specifically convey, although others methodology is rehashed until all nodes are done [17]. At last,
needs the support of moderate nodes to course their parcels. when its all said and done wireless links and nodes are
Each of the nodes has a wireless interface to correspond with checked, the network ET is constructed and the complete
system is done. By utilizing the SSRA, a network with
one another [6]. These networks are completely distributed,
numerous nodes and wireless links will be lessened in a
and can work at wherever without the assistance of any settled network with a little number of nodes and wireless links.
foundation as access focuses or base stations, All networking
functions, for example, routing and parcel sending, are
performed by nodes themselves in an organizing toward
oneself way. Consequently, securing a mobile ad -hoc network
is extremely testing.
808
IJRITCC | June 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 6 806 810
_______________________________________________________________________________________________
the generation number. The rank is decided based on the value
of fitness function T. When the rank is low the fitness value is
low. This means that the selected route has a low delay and a
high transmission rate.
810
IJRITCC | June 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________