Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Transmission by Victimization Mobile Spontaneous Networks

M. Gayathri, N. Alaguraj


Two major options of mobile spontaneous networks (MANETs) will increase big selection of users and its quality; therefore, the options square measure flexibility and quality. As network size will increase, a lot of security violations conjointly can occur to shield these variety of networks, n variety of security algorithms and protocols are developed to shield routing and application knowledge. However, it protects solely date routes or communication network, not both. To avoid this each secure routing and security communication protocols should be enforced to produce complete protection. This communication security protocols square measure originally developed for wireless sensing element networks to position a significant burden on the restricted network resources of a MANET. The use of communication security protocols originally developed for wire line and Wi-Fi networks may place a significant burden on the restricted network resources of a MANET. The framework is meant to permit existing network and routing protocols to perform their functions, while providing node authentication, access management, and communication security mechanisms. Simulation results comparison SUPERMAN with IPsec, SAODV and SOLSR square measure provided to demonstrate the projected frameworks quality for wireless communication security. It provides secure transmission at the time the hackers hit the method received solely empty data. This paper presents a completely unique security framework for MANETs, to beat the traffic problems, delay of communication nodes and defend from attackers. The in-sequence transmission in secure path.

Cite this Article

M. Gayathri, N. Alaguraj. Secure Transmission by Victimization Mobile Spontaneous Networks. Journal of Mobile Computing, Communications & Mobile Networks. 2018; 5(3): 15–22p.



Full Text:



Myers M, Ankney R, Malpani A, Galperin S, Adams C. X. 509 net public key infrastructure on-line certificate standing protocol-OCSP. RFC 2560. Jun. 1999, Doi: 10.17487/RFC2560.

Doraswamy N, Harkins D. IPSec: The New Security customary for the web, Intranets, and Virtual personal Networks. higher Saddle watercourse, NJ, USA: tyro Hall skilled, 2003.

Ghosh A, Talpade R, Elaoud M, Bereschinsky M. Securing ad-hoc networks victimisation IPSEC. Proc. IEEE Mil. Commun. Conf. 2005; 2948–2953p.

Gu Y, Liu H, Zhao B. Target coverage with QoS necessities in wireless sensing element networks. Proc. Intell. Pervas. Comput. 2007: 35–38p.

Chaudhary M, Pujari AK. Q-coverage problem in wireless sensing element networks. Proc. Int. Conf. Distrib. Comput. Netw. 2009; 325–330p.

Karaboga D, Akay B. A survey: Algorithms simulating bee swarm intelligence. Artif. Intell. Rev. 2009; 31 (1–4): 61–85p.

Karaboga D, Basturk B. On the performance of artificial bee colony (SUPERMAN) algorithmic program. Appl. Soft Comput. 2008; 8: 687–697p.

Karaboga D, Gorkemli B, Ozturk C, Karaboga N. A comprehensive survey:

Artificial bee colony (SUPERMAN) algorithmic program and applications. Artif. Intell. Rev. 2012: 1–37p.

Karaboga D, Ozturk C, Karaboga N, Gorkemli B. Artificial bee colony programming for symbolic regression. Inf. Sci. 2012; 209: 1–15p.

Karaboga D, Okdem S, Ozturk C. Clusterbased wireless sensing element network routing victimisation artificial bee colony algorithmic program. Wireless Netw. 2012; 18 (7): 847–860p.


  • There are currently no refbacks.