Skip to main content

Computational Hybrid Approaches for Routing and Security Optimization in Networks

  • Conference paper
  • First Online:
Data Science and Analytics (REDSET 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1229))

  • 672 Accesses

Abstract

Portable Ad-hoc Network also referred as Mobile ad-hoc Networks (MANET) is a no established, foundation less system worked for different military, law, salvage activities and these days most prevalent are Online Social networks (OSN). Since the applications where MANET is used for, requires explicit and upgraded security and steering strategies, breaks should be stayed away from for execution improvement in OSN. MANET’s are crucial against different assaults and posture steering and security challenges just as circumstances so the proposed computational Route Amassed (RA) and Adroit Iris Testament (AIT) directing and security approach connects the tradeoff in MANET and beats different impediments winning in customary procedures of MANET. Because of fame and acknowledgment of biometrics against different security ruptures, iris is a standout amongst the most solid and remarkable biometric quality that is used in this chapter for security upgrades in MANET. The proposed Route Amassed approach attaches a focal controller eluded as focal lead, into the MANET task which generally pursues a dispersed methodology. The expansion of a focal lead which is chosen with the assistance of an irregular capacity, renders the quicker location of courses and subsequently, quicker conveyance of parcels, which is further aide with the procedure of course accumulation which enables the courses to be amassed at the focal lead and just the location of the focal lead is publicized in the system and hence it abbreviates the steering tables of different hubs. So the examination approach talked about, broke down and actualized in this chapter initially investigates verified methodology and produces grave biometric signature for beating different security worries through MATLAB test system and afterward further through NS2 test system upgrades QOS parameters like however put (throughput), start to finish deferral (packet delivery ratio) and bundle conveyance proportion (end-to-end delay) through Route Amassed Approach subsequently giving a verified just as course improved methodology for MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adibi, S., Mobasher, A., Tofighbakhsh, M.: Fourth-Generation Wireless Networks: Applications and Innovations. IGI Global (2010)

    Google Scholar 

  2. Alslaim, M.N., Alaqel, H.A., Zaghloul, S.S.: A comparative study of MANET routing protocols. In: The Third International Conference on e-Technologies and Networks for Development (ICeND2014), pp. 178–182 (2014)

    Google Scholar 

  3. Arrobo, G.E., Gitlin, R.D.: Improving the reliability of wireless body area networks. In: 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC, 30 August–3 September, pp. 2192–2195 (2011)

    Google Scholar 

  4. Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of Wireless Body Area Network (WBAN) and role of a virtual doctor server in existing architecture. In: 2012 Third International Conference on Intelligent Systems, Modelling and Simulation (ISMS), 8–10 February 2012, pp. 214–219 (2012)

    Google Scholar 

  5. Corson, S., Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. Network Working Group, RFC2501 (1999)

    Google Scholar 

  6. El-Masri, S., Saddik, B.: An emergency system to improve ambulance dispatching, ambulance diversion and clinical handover communicationĂ¢-a proposed model. J. Med. Syst. 36, 3917–3923 (2012)

    Article  Google Scholar 

  7. Hanzo, L., Tafazolli, R.: A survey of QoS routing solutions for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 9(2), 50–70 (2007)

    Article  Google Scholar 

  8. Istepanaian, R.S.H., Zhang, Y.T.: Guest editorial introduction to the special section: 4G health, the long-term evolution of m-health. IEEE Trans. Inf Technol. Biomed. 16, 1–5 (2012)

    Article  Google Scholar 

  9. Jovanov, E., Milenkovic, A.: Body area networks for ubiquitous healthcare applications: opportunities and challenges. J. Med. Syst. 35, 1245–1254 (2011)

    Article  Google Scholar 

  10. Perahia, E., Gong, M.X.: Gigabit wireless LANs: an overview of IEEE 802.11 ac and 802.11 ad. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15, 23–33 (2011)

    Article  Google Scholar 

  11. Keikhosrokiani, P., Zakaria, N., Mustaffa, N., Wan, T.-C., Sarwar, M.I., Azimi, K.: Wireless networks in mobile healthcare. In: Adibi, S. (ed.) Mobile Health. SSB, vol. 5, pp. 687–726. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-12817-7_30

    Chapter  Google Scholar 

  12. Redieteab, G., Cariou, L., Christin, P., Helard, J.F.: PHY+MAC channel sounding interval analysis for IEEE 802.11ac MU-MIMO. In: 2012 International Symposium on Wireless Communication Systems (ISWCS), 28–31 August 2012, pp. 1054–1058 (2012)

    Google Scholar 

  13. Tian, H.: Hermes: a scalable sensor network architecture for robustness & time energy awareness. A Dissertation Proposal Department of Computer Science University of Virginia (2003)

    Google Scholar 

  14. Xiaoyi, Z., Doufexi, A., Kocak, T.: Throughput and coverage performance for IEEE 802.11ad Millimeter-Wave WPANs. In: 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 15–18 May, pp. 1–5 (2011)

    Google Scholar 

  15. Zain, A.S.M., Yahya, A., Malek, M.F.A., Omar, N.: 3GPP long term evolution and its application for healthcare services. In: 2012 International Conference on Computer and Communication Engineering (ICCCE), 3–5 July, pp. 239–243 (2012)

    Google Scholar 

  16. Zafar, S., Soni, MK., Beg, MMS.: An optimized genetic stowed approach to potent QOS in MANET. Procedia Comput. Sci. 62, 410–418 (2015)

    Google Scholar 

  17. Zafar, S.: Cyber secure corroboration through CIB approach. Int. J. Inf. Technol. 9(2), 167–175 (2017). https://doi.org/10.1007/s41870-017-0018-7

    Article  MathSciNet  Google Scholar 

  18. Zafar, S., Soni, MK.: Secure routing in MANET through crypt-biometric technique. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 713–720 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siddhartha Sankar Biswas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iftekhar, N., Zafar, S., Khan, S., Biswas, S.S. (2020). Computational Hybrid Approaches for Routing and Security Optimization in Networks. In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1229. Springer, Singapore. https://doi.org/10.1007/978-981-15-5827-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5827-6_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5826-9

  • Online ISBN: 978-981-15-5827-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics