Abstract

The concept of peer to peer mobile networks reflects on tactical network. This approach helps mobile nodes to scatter anywhere in the network and it also provide additional support for the MANET in terms of data distribution. This paper provides the result of such approach in terms of network cluster formation with secure node proximity within the boundary. This proximity paradigm will enhance the performance of network by avoid wide scattering of mobile nodes beyond the networks zone. The results shown in this paper were the work done in ns2 mobility package. The result also incorporates AODV routing protocol with IEEE 802.11 MAC for wireless network to improve network performance using mobile node proximity in conjunction with the previous work indicating the network performance degradation with these configuration. To device proximity among mobile nodes were done along with secure mechanism, such that every nodes data transmission was done only on the basis of IDS implementation with PSO fitness value. This will invoke security for every data transmission done on this network. This work has significant effect by improving network performance by 50%. Keywords: Multi Hop Cellular Network, Mobile Node Proximity, Tactical Mobile Network

Highlights

  • The Peer-to-Peer mobile connection is proven to be ­effective for data transformation between mobile nodes with a network

  • If a mobile network of 1000 nodes the network performance will be measured by the active participation of mobile nodes

  • We proposed the network based on Multi Hop Cellular Network instead of Multi Peer-to-Peer network since Multi Hop Cellular networks deploys single hop which connects mobile nodes with base station

Read more

Summary

Introduction

The Peer-to-Peer mobile connection is proven to be ­effective for data transformation between mobile nodes with a network. Multi Hop Secure Adhoc Network to Eradicate Cooperative Diversity work the cluster layout does additional functionality of network partitioning These works address the degradation of network based on randomized nodes sharing its part in the mobile network. The extensive features of IEEE 802.11 along with clustered layout provide low packet delivery These issues arose due to randomized locations of mobile nodes which were the part of mobile network. Despite the node be randomized or scattered in terms of location, the particular node can be a part of the network using the proximity approach for effective data transformation between nodes or to the all nodes in the network This proximity and the IDS security mechanism provide effective mobile services in terms of its QOS

Clustering Nodes based on Proximity
Cluster Formation
Secure Mobile Nodes in Cluster
Work Flow of RWP using AODV
Simulation Result
Findings
Conclusion and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.