Abstract-In the current research the enhancement of the secured MANET routing protocol is done. The protocol chosen for enhancement is AOMDV based upon RERMR and AMDMM due to the low QOS in the existing AOMDV. Encryption is quite an important parameter in the MANET. To make RERMR more secure 3d cryptography technique is implemented in it for secure transmission. By applying the encryrption technique in the RERMR, some times the overheads are introduced in it. To overcome the problem of data dropped, load and encryption overheads in the network, an optimization technique called Adaptive ACO are used. Using the above mentioned optimization technique the data dropped and the losses in the network are reduced to some extent. The above defined results have shown the parameters that are improved using a network simulator called MATLAB. The existing protocol generates much load on the network and the packets start delayed in network. This problem is reduced in the proposed approach using an optimization technique which makes multiple paths to the packets that are sent to the destination. By using the exactly reciprocal path the network can send data through multiple paths and the load in the network can be reduced.
In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source. In this research a generalized model for detection has been created by studying the existing models and algorithms on DoS attacks. Internet security is vital to facilitate e-commerce transactions, and there has been continued research effort to provision network traffic monitoring at high speeds. In the proposed technique a threshold is also defined so that any other node id which is greater than that threshold may be prevented. In case of any intrusion IP backtracking and packet logging is used to detect the intruder and mitigate it. From result it may be clear that the QoS parameters are improved using proposed approach and there are improved by approx 15-18% from the existing approach.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.