Route Leak Identification: A Step toward Making Inter-Domain Node Location Estimation
DOI:
https://doi.org/10.26438/ijcse/v6i12.198209Keywords:
Location-based service security, point of interest, Network Route identification based on Node Location estimation, Optimal location route estimatedAbstract
Vehicular Ad-Hoc Network (VANET) is a variation of MANET (Mobile Ad-hoc network). MANET has many nodes involved without the central network and the nodes are equipped with network skills. If node leaks through a large network of service disruptions that can produce one of the anomalies of the inter-domain route. Route leaks are among the routing policies of autonomous systems because of the violation. Unfortunately, there are not many studies that location and route analysis of the route leak issue were discussed. There exist few convention solutions that can be problem as a first route of defense, such as route filters. The proposed system is applied based on the Network Route Identification leaks based on Node Location estimation (NRINLE). The path trail attracts different colored network system simulation polyline or marker node customization. There is more network simulation travel leaks on routes that are recommended for traveling by location. The main method can be location spaces like node tripping path leaks. In the network we create a rather fundamental theoretical application, a specific way of active network fits with a path leak location. Then motive the probable occurrence of route leaks in different location scenarios, with the aim of formulating requirements for their identification. And hence thereof prevention to good performance improve location leaks reliability.
References
[1] Vijayasathana. Vishnukumar. May 2015,’ Conscious Aware Routing Protocol for VANET’, International Journal of Science, Engineering and Technology Research (IJSETR), Vol.6, pp (1-7).
[2] Shilpa Shetty A, Sannidhan, May 2016,’ Packet Drop Detection VANET system’, International Journal of Computer Science and Mobile Computing (Ijcsmc), Vol. 5, Pp (656-661).
[3] Kaushik, Chowdhury, Akyildiz, April 2017,` Crp: A Routing Protocol for Cognitive Radio VANET,` IEEE Journal Areas in VANET, Vol. 29, No. 4, pp (794-804).
[4] Hsien-Kai Hsin, En-Jui Chang 2014,` Ant Colony Optimization-Based Fault-Aware Routing In Mesh-Based Network-On-Chip Systems,` IEEE Transactions On Computer-Aided Design Of Integrated Circuits And Systems, Vol. 33, No. 11, pp (1693-1705).
[5] Xiao Chen, Zanxun Dai, 2014,` ProHet: A Probabilistic Routing Protocol with Assured Delivery Rate for VANET network,` IEEE Transactions on VANET Communication, Vol. 14, No. 7, pp (1504-1531).
[6] Shuguang Fu, 2015, ‘Identification of Radio Network Routing Method Based on Genetic Algorithm,` IEEE International Journal of Future Generation Communication VANET Networking System, Vol. 7, No. 4, pp (2629-2368).
[7] Leela Priya, Lalitha2, 2016’ Energy Efficient Routing Models in location - A Recent Trend Survey,` International Journal of Pure and Applied Mathematics Vol.118, No. 16, pp (443-458).
[8] Ping Yi, Zhoulin Dai 2013,` A New location Attack in Vehicle Ad Hoc Networks,` International Journal of Computer Technology Vol. 16 No. 22, Pp (1-142).
[9] Li Qiang Tao and Feng Qi Yu, Aug 2010,’ ECODA: Enhanced Congestion Detection and Avoidance for Multiple Class of Traffic in location Networks,` IEEE, pp (1387-1394).
[10] Wenfeng Xia, Yonggang Wen, 2015,` A Survey on Software-Defined Networking,` IEEE Communication Surveys & Tutorials, Vol. 17, No, 1, pp (27-51).
[11] Bara’a Ali Attea, Feyza Yıldırım Okay, 2012,’ Multi-objective Evolutionary Algorithm Based on Decomposition for Efficient Coverage Control in leaks Networks,` IEEE, Vol.5, pp (1-6).
[12] Fareen Farzana, Neduncheliyan, 2018,` Multi-objective Artificial Bee Colony based Routing in Mobile Wireless Sensor Network,` International Journal of Pure and Applied Mathematics, Volume 118, No. 8, pp (635-641).
[13] Zesong Fei, Bin Li, 2016,` A Survey Of Multi-Objective Optimization In Wireless Sensor Networks: Metrics, Algorithms And Open Problems,` Accepted To Appear On IEEE Communications Surveys & Tutorials, Vol.1, Pp (1-38).
[14] Saleh, Oct 2017,’ Enhancing Multi-Objective Optimization for Wireless Sensor Networks Coverage using Swarm Bat Algorithm,` International Journal of Computer Applications (0975 – 8887) Volume 175 – No.9, pp (1-7).
[15] Song, Gong, Aug 2017, ‘Coverage Hole Recovery Algorithm Based on Molecule Model in Heterogeneous WSNs,` International Journal of Computers Communications &controls, vol.12, No.4, pp (562-576).
[16] Jinil Persis, and Paul Robert, May 2015,’ Ant Based Multi-objective Routing Optimization in Mobile AD-HOC Network,` Indian Journal of Science and Technology, Vol 8, No.9.pp 875–888.
[17] Ali Norouzi, Ahmet Sertbas, 2015,’ Energy Efficient Coverage Optimization in Wireless Sensor Networks based on Genetic Algorithm,` Universal Journal of Communications and Network, Vol.3, No.4, pp (82-88).
[18] Narendra Reddy, Vishnuvardhan May 2013,’ Routing Attacks In network system communication, Computer Science and Mobile computing system,` Ijcsmc, Vol. 2, Issue. 5, pp 360 – 367.
[19] Aditi, Joy Karansingh, Jul 2016,’ Analysis of Various Security Attacks Mobile Adhoc Network,` International Research Journal of Engineering and Technology, Vol.3, Pp (1-4).
[20] Ankita Gupta, Sanjay Prakash Ranga, July 2012,’Network Node Various Location Attacks in Mobile Ad-Hoc Networks, Journal of Computing and Corporate Research.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
