Professional Documents
Culture Documents
+e
Where p
=
m+2
n+4
, where m is the number f packets sent and n
is the number of packets received. And e= z
_
p
(1-p
)
n+4
;
Where z=1.96
Accusation based reaction detects the malicious
behavior of the nodes. Accusation based reaction following
three steps:
1. Set the timer with a timeout value of (1ePDR)
where is set to 0.02sec by experiments.
2. Accusation message propagation and handling.
3. Recovery message propagation and handling.
IV. PROPOSED SYSTEM
S-ODMRP is a novel defense scheme against the
attacks. It follows rateGuard techniques are measurement
based detection and accusation based reaction.
It is briefly discussed in section III.B To
enhancing the high throughput performance and reduce the
end to end delay using cross layer design (CLD) is
proposed. Cross layer design for S-ODMRP using network
and MAC layer, Proposed in this section. CLD for S-
ODMRP is increase the throughput performance in the
network layer. Available bandwidth is calculated in MAC
layer. Delay and loss are concentrated in this layer. S-
ODMRP protocol is also have the high throughput
performance and also provides the security against the
attacks proposed by jing dong et.al. In order to enhance the
throughput performance level and also reduce the end to
end delay level cross layer design is implemented for S-
ODMRP protocol. Cross layer design is done for S-
ODMRP protocol. Network and MAC layer is considered
for this S-ODMRP protocol from these OSI layers.
1. The data is send through network and MAC layer from
source to the destination. Cross layer design focused
network and MAC layer.
2. Data send to the network layer, S-ODMRP routing
protocol is taken in the network layer for forwarding the
data.
3. Cross layer design of S-ODMRP is implemented to
achieving high throughput; reduce the end to end delay.
4. This data is send to the MAC layer from network layer
to achieve available bandwidth.
a. Hop metric is calculated for forwarding from source to
destination. Hop metric for ij node is given
1(minop count | maxno.o noJcs)
b .Bandwidth of the node I in MAC layer is calculated by
Bdw
I
=Bdw
ch
(t
I
/total time)*0.8, Where 0.8 is the
weight factor.
c. Node load also calculated in MAC layer
is given by node load=
qucuc Icngth o] nodc
tot qucuc Icngth o] nodcs
Cross layer design is calculated by multiplication of three
parameters from network and MAC layer.
V. SIMULATION ANALYSIS
S-ODMRP and CLD for S-ODMRP was
implemented in NS-2(network simulator-2). Ns-2 is a
packet level simulator and a discrete event scheduler which
is used to simulate wired and wireless network. Ns-2 is a
standard experiment environment in research community
which uses Tool Command Language (TCL) as a scripting
language. A network environment with 140 nodes has been
simulated, among which 20 nodes are randomly chosen as
multicast group members for experimental evaluation and
one randomly selected among them as a data source.
Malicious nodes are randomly selected among nodes that
are not group members. Group members join the group in
the beginning of the simulation. At the second 100, the
source starts multicasting 512-byte data packets for 400
seconds at the rate of 20 packets/second. The performance
evaluated based on Packet delivery ratio, throughput
performance, and end to end delay is taken into account.
In comparing the three protocols, evaluation could be done
in the following two metrics:
(1) The packet delivery ratio
(2) End to end delay
1. Packet delivery ratio (PDR)
PDR=Number of packets received/total number of
packets send. PDR value of ODMRP, S-ODMRP and
Cross layer design for S-ODMRP was implemented in
NS2.
Fig 3 Comparisons of the PDR value of CLD S-ODMRP, S-ODMRP and
ODMRP.
International Journal of Computer Trends and Technology (IJCTT) - volume4 Issue5May 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 1474
Fig 3 shows Packet Delivery Ratio of the
ODMRP, S-ODMRP and CSODMRP. The performance is
compared with the ODMRP and S-ODMRP approach.
Cross layer design for S-ODMRP provides the higher
Packet delivery ratio when compared with the S-ODMRP
and ODMRP
2. End to end delay
Fig 4 shows Average end to end delay in
the presence of attackers and there is no attack. It is clear
from the graph that the end-to-end delay is maintained at
the low level in the absence of attack. The average end-to-
delay is maintained low for Cross Layer Design of S-
ODMRP compared to the S-ODMRP and ODMRP.
Fig 4 Comparisons end to end delay of CS-ODMRP,S-ODMRP and
ODMRP.
Tabular column shows the PDR and end to end
delay of Cross layer design for S-ODMRP, S-ODMRP,
ODMRP protocols. These are implemented in NS-2.
Packet delivery ratio of Cross layer design for S-ODMRP
is high 85% compared to the other protocols. End to end
delay is low for 140 nodes compared to S-ODMRP,
ODMRP protocols. PDR also enhance the throughput
performance level.
Protocol
No. of
nodes
PDR
End to
end delay
CS-ODMRP
140
85 32
S-ODMRP 140 80 35
ODMRP 140 65 50
Table1:-Packet delivery ratio and end to end delay of CLD for S-
ODMRP.S-ODMRP, ODMRP.
VI. CONCLUSION
In this paper we have developed a cross layer
design for S-ODMRP using network and MAC layer. Cross
layer design for S-ODMRP enhancing the high throughput,
reduce the end to end delay. In this paper analyze the cross
layer design for S-ODMRP protocol in network layer and
available bandwidth parameters are considered in MAC
layer.
REFERENCES
[1] J ing Dong; Curtmola, R.; Nita-Rotaru, C., Secure High-
Throughput Multicast Routing in Wireless Mesh
Networks, Mobile Computing, IEEE Transactions on,
vol.10, no.5, pp.653- 668, May, 2011.
[2] Yih-Chun Hu; J ohnson, D.B.; Perrig, A., SEAD: secure
efficient distance vector routing for mobile wireless ad hoc
networks, Mobile Computing Systems and Applications,
2002.Proceedings, Fourth IEEE Workshop on, vol., no., pp.
3- 13, 2002.
[3] LuoJ unhai, Ye Danxia, Xue Liu, Fan Mingyu., A survey of
multicast routing protocols for mobile Ad-Hoc
networksIEEE Communications Surveys & Tutorials
Vol.11,No.1.(2009),pp.78-91.
[4] J ian Tang; GuoliangXue; Weiyi Zhang,, Cross-Layer
Design for End-to-End Throughput and Fairness
Enhancement in Multi-Channel Wireless Mesh Networks,
Wireless Communications,IEEE Transactions on , vol.6,
no.10, pp.3482 3486,October,2007.
[5] LuoJ unhai; Ye Danxia; Xue Liu; Fan Mingyu., A survey of
multicast routing protocols for mobile Ad-Hoc networks,
Communications Surveys & Tutorials, IEEE , vol.11, no.1,
pp.78- 91, First Quarter 2009.
[6] Xiang, X.; Xin Wang; Yang, Y., Supporting Efficient and
Scalable Multicasting over Mobile Ad Hoc Networks,
Mobile Computing, IEEE Transactions on, vol.10, no.4,
pp.544-559, April 2011.
[7] Roy, S.; Addada, V.G.; Setia, S.;J ajodia, Securing
MAODV: attacks and Countermeasures, Sensor and Ad
Hoc Communications and Networks, 2005. IEEE
SECON2005. 2005 Second Annual IEEE Communications
Society Conference on, vol., no., pp. 521-532, 26-29 Sept.,
2005.
[8] Qian Zhang, Ya-Qin Zhang, Cross-Layer Design for QoS
Support in Multihop Wireless Networks, Proceedings of
the IEEE, vol.96, no.1, pp.64-76, J an. 2008.
[9] J ihong Shi; J iang Yu; Haiyan Li; RongZong., AODV
Protocol Optimization Based on Cross- Layer Design of
WMN, Wireless Communications, Networking and Mobile
Computing(WiCOM), 2011 7th International Conference on
, vol., no., pp.1-4, 23-25 Sept.,2011.
[10] Frank Aune, Cross Layer Design Tutorial, November
2004.
[11] Tao Yang; Wang Gang; Zhao Qiang; Lin J ian; Wan J un.,
Improved network coding based on ODMRP protocol in
Ad Hoc network, Advanced Computer Control
(ICACC), 2011 3
rd
International Conference on , vol., no.,
pp.461-464, 18-20 J an. 2011.
[12] Mo'men, A.M.A.; Hamza, H.S.; Saroit, I.A., A survey on
security enhanced multicast routing protocols in Mobile
Ad hoc Networks, High-Capacity Optical Networks and
EnablingTechnologies (HONET), 2010 , vol., no., pp.262-
268, 19-21 Dec. 2010.
[13] Gummadi J ose Moses.; P. Suresh Varma,; N. Supriya,;
CL-S-ODMRP- A Cross Layered Secure ODMRP for
Achieving High-Throughput in Wireless Networks,
European J ournal of Scientific Research ISSN 1450-216X
Vol. 87 No 2 September, 2012, pp.244-253.
[14] Ian F.Akyildiz,;xudong Wang,; Cross-Layer in Wireless
Mesh Networks, IEEE transaction on vehicular
technology.Vol.57,no.2, March 2006.