Open Access Open Access  Restricted Access Subscription or Fee Access

Integration of RMAC with Hybrid Routing Algorithms in MANETS

R. Jeeva, M. Ayyam Perumal

Abstract


Nodes in Adhoc networks evaluate the parameters like Qos, transceiver velocity, transmission threshold, transmitter signal carrier frequency etc to choose the optimal path to transmit the data. But when the transmission mode is mobile, the most important parameter to be considered is Battery power consumption to avoid loss of nodes without notification. To implement the above requirement, we proposed a system that forms the centralization in a dynamic way to allocate nodes for transmission based on the above parameter that reduces the routing overload but also extend battery life of the mobile devices by reducing the required number of operations for route determination. Another important parameter for transmitting data is security. So we have framed Randomized Matrix Arithmetic Coding (RMAC), that uses a randomized matrix formed by the random key based on the user profile for encryption using the symbols in the matrix, not by the key and at the same time it is easy to recreate the matrix at the decryption side if authenticated.

Keywords


Transceiver Velocity, RMAC

Full Text:

PDF

References


H. Kim, J. T. Wen, and J. D. Villasenor, “Secure arithmetic Coding,” IEEE Trans. Signal Process., vol. 55, no. 5, pp. 2263–2272, May 2007.

J. T. Wen, H. Kim, and J. D. Villasenor, “Binary arithmetic coding with key-based interval splitting,” IEEE Signal Process. Lett., vol. 13,pp. 69–72, Feb. 2006.

Jiantao Zhou, Oscar C. Au,, and Peter Hon-Wah Wong, “Adaptive chosen-cipher text attack on secure arithmetic coding” IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1825–1838, May 2009.

Raj S. Katti, Sudharsan K. Srinivasan and Aida Vosughi, “On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks” IEEE Trans. Information Forensics & Security, vol. 6, no. 1, pp. 19-27, March 2011.

V. Kavitha and S. Balaji, “ESAC Based Channel Aware Routing with Route Handoff,” in IJCSE, Mar. 2011, pp.1260–1269.

Mamoun Hussein Mamoun, “Location Aided Hybrid Routing Algorithm for MANET” in IJENS, Feb.2011, pp.51-57.

Xiaoqin Chen, Haley M. Jones, and Dhammika Jayalath, ”Channel Aware Routing in MANETS with Route Handoff” IEEE Trans. Mobile Computing., vol. 10, no. 1, pp. 108-120, Jan 2011

Siva Ram Murthy, C. and B. S. Manoj. Ad hoc Wireless Networks: Architectures and Protocols. 1st Edn. , Prentice Hall, USA, pp: 880, 2004.

Ehsan H, Uzmi ZA, “Performance Comparison Of Ad Hoc Wireless Network Routing Protocols,” Proceedings of INMIC, pp. 475- 465, Dec. , 2004.

Stajmenovic I, “Position Based Routing in Ad Hoc Networks,” IEEE Commun. Magazine, Vol. 40, No. 7: pp.128-134, 2002.

H. A. Bergen and J. M. Hogan, “A chosen plaintext attack on an adaptive arithmetic coding compression algorithm,” Comput. Secur., vol.12, pp. 157–167, Mar. 1993.

H. Ishibashi and K. Tanaka, “Data encryption scheme with extended arithmetic coding,” in Proc. SPIE, Dec. 2001, vol. 4475, pp. 222–233.

A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1997.

R. Motwani and P. Raghavan, Randomized Algorithms. Cambridge, U.K.: Cambridge Univ. Press, 1995.

P. G. Howard and J. S. Vitter, “Arithmetic coding for data compression,” Proc. IEEE, vol. 82, pp. 857–865, Jun. 1994.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.