ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enhancing the Routing Overhead in Heterogeneous Network using Bio-Inspired Tiny-Termite Routing Algorithm for Securing MANET

Journal: Excel International Journal of Technology, Engineering and Management (Vol.1, No. 1)

Publication Date:

Authors : ; ; ; ; ;

Page : 129-132

Keywords : Bio-inspired; meta heuristic; Opt-Termite; stigmergy; routing packet overhead; load balancing; routing table; Tiny-Termite; Packet Tracer.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Bio-inspired algorithms insist a hot topic in the developments of innovative algorithms inspired by nature in heterogonous networks. These nature-inspired Meta heuristic algorithms can be based on swarm intelligence, biological systems, physical and chemical systems depending on the sources of inspiration. A routing protocol inspired by the termite activity in nature, called Optimized-Termite (Opt-Termite). Opt-Termite uses the concept of stigmergy for self-organization, thereby reducing the control routing packet overhead. Opt-Termite mainly concentrates on load balancing for optimization. With Opt-Termite, a route with less loaded mobile nodes in terms of traffic will be chosen to reach destination. The routing information at each node gets inclined by the movement of packets and the routing table will be updated accordingly. It also allows the use of multiple paths and each packet is routed randomly and independently. In this paper, Tiny-Termite is a Bio-inspired routing algorithm that is reliable and secure against selective forwarding and replay attacks. The experiments were done to compare its performance with that of the traditional Termite algorithm. We propose a secure routing protocol which is based on inspiring behaviour of Termite, called Tiny-Termite. The suspicion defense mechanism in Tiny-Termite provided a significantly better defense against the attacker than Termite alone. Tiny-Termite is implemented in Packet Tracer Tool. Using this, a few algorithms have proved to be very efficient and thus have become popular tools for solving security problems in heterogeneous environment.

Last modified: 2015-01-12 21:14:23