By Topic

Enhancing performance in adhoc networks using cross layer designs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Anshu, C. ; Deptt. of Comput. Applic., MITS, Gwalior, India ; Goswami, D.N.

Mobile Ad Hoc Network is formed on the fly by a collection of autonomous wireless devices. This network is temporary. The unique features of MANET make security a crucial aspect to tackle. Besides, the MANETs are resource constraints. Hence, the solution should not sideline the issue of performance. Keeping these issues in mind, the scheme proposed in this paper emphasizes the issues of security along with performance optimizations at different layers. Additionally, this scheme is ground-breaking as it looks for hardware and software combination. It simply utilizes the messages being passed among different layers at the interface to deduce important information, which helps the better utilization of existing system. In our work, we have analyzed the issues affecting performance and security of adhoc network at different layers and realize that using the information from different layer passing through interfaces rather than securing one aspect of the network can improve the performance and security of the complete network manifold. This scheme is therefore efficient in an area like Ad Hoc Networks. The scheme proposed utilizes cross layer processing between physical (PHY), medium access control (MAC), network (NET) layers and application layer. Along with malicious activity, the proposed scheme tackles the problem of disconnections and congestion in order to optimize the network performance.

Published in:

Information and Communication Technologies (WICT), 2011 World Congress on

Date of Conference:

11-14 Dec. 2011