Prachatos Mitra

Work place: Institute of Engineering & Management, Kolkata, India

E-mail: prachatosmitra@gmail.com

Website:

Research Interests: Computational Science and Engineering, Computer systems and computational processes, Computer Architecture and Organization, Data Structures and Algorithms

Biography

Prachatos Mitra is a student in Institute of Engineering and Management. He is currently studying for B.Tech in Computer Science and Engineering, and will be graduating in 2018.

Author Articles
Intelligent Energy Aware Fidelity Based On-Demand Secure Routing Protocol for MANET

By Himadri N. Saha Prachatos Mitra

DOI: https://doi.org/10.5815/ijcnis.2018.04.06, Pub. Date: 8 Apr. 2018

Mobile Ad-Hoc Networks are very flexible networks, since they do not depend on any infrastructure or central authority. Due to this property, MANETs are highly ubiquitous in defense, commercial and public sectors. Despite the usage, MANET faces problems with security, packet drops, network overhead, end-to-end delay and battery power. To combat these shortcomings, we have proposed a new trust based on-demand routing protocol that can adapt to the specific energy conditions of nodes in a MANET. It uses the concept of fidelity which varies depending on packet drops. This fidelity is monitored through direct and indirect methods. The main aim of the protocol is to develop a model that considers both trust and battery power of the nodes, before selecting them as prospective nodes for secure transmission of data. With dynamic battery threshold calculations, the nodes make an intelligent choice of the next hop, and packet losses are effectively minimized. In addition to providing data origin authentication services, integrity checks, the proposed “Intelligent Energy Aware Fidelity Based On-Demand Secure Routing (IEFBOD)” protocol is able to mitigate intelligent, colluding malicious agents which drop packets or modify packets etc. that they are required to forward. New packets called report and recommendation have been used to effectively detect and eliminate these malicious nodes from a network. Our protocol has been compared to other existing secure routing protocols using simulation, and it displays improved performance metrics, namely high packet delivery fraction, low normalized routing load and low end-to-end delay.

[...] Read more.
Other Articles