FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Intensive Analysis of Routing Algorithm Detection over Mobile Ad hoc Network Using Machine Learning

Author(s): Dr. M. V. Rajesh1, P V V S Srinivas2 and A. Lakshmanarao3

Publisher : FOREX Publication

Published : 12 November 2022

e-ISSN : 2347-470X

Page(s) : 963-968




Dr. M. V. Rajesh, Professor, Department of IT, Aditya Engineering College, Surampalem, India; Email: rajesh.masina@aec.edu.in

P V V S Srinivas, Department of CSE, Koneru Lakshmaiah Education Foundation, Vijayawada, India; Email: cnu.pvvs@gmail.com

A. Lakshmanarao*, Associate Professor, Department of IT, Aditya Engineering College, Surampalem, India; Email: laxman1216@gmail.com

    [1] J. H. Schiller, mobile communications, Pearson Education, 2003.[Cross Ref]
    [2] P. Ranjan and K. K. Ahirwar, “Comparative study of vanet and manet routing protocols,” in Proc. of the International Conference on Advanced Computing and Communication Technologies (ACCT 2011), 2011.[Cross Ref]
    [3] A. Penttinen, "Minimum cost multicast trees in ad hoc networks," 2006 IEEE International Conference on Communications, 2006, pp. 3676-3681, doi: 10.1109/ICC.2006.255643.[Cross Ref]
    [4] N. H. Saeed, M. F. Abbod and H. S. Al-Raweshidy, "MANET routing protocols taxonomy," 2012 International Conference on Future Communication Networks, 2012, pp. 123-128, doi: 10.1109/ICFCN.2012.6206854.[Cross Ref]
    [5] Ankur O. Bang , Prabhakar L. Ramteke , “MANET : History,Challenges And Applications”, International journal of application or Innovation in Engineering & Management(IJAIEM), Volume 2, Issue 9, September 2013.[Cross Ref]
    [6] Meenakshi Yadav, Nisha Uparosiya, “Survey on MANET: Routing Protocols, Advantages, Problems and Security”, International Journal of Innovative Computer Science & Engineering, Volume 1, Issue 2, pp. 12-17.[Cross Ref]
    [7] P. Rajankumar, P. Nimisha and P. Kamboj, "A case study of implementation and simulation of new protocol in NS2: The PING protocol for MANET environment," 2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014, pp. 844-849, doi: 10.1109/IndiaCom.2014.6828082.[Cross Ref]
    [8] P. Gupta, “ Study the Effect of Mobility Model on Various Parameters by Varying Node Density in VANETs for TCP and CBR Applications,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, no. 9, pp. 297–302, 2015.[Cross Ref]
    [9] H. Bakht, “Survey of routing protocols for mobile ad-hoc network,” International Journal of Information and Communication Technology Research, vol. 1, no. 6, 2011.[Cross Ref]
    [10] L. Chen and W. B. Heinzelman, “A survey of routing protocols that support QoS in mobile ad hoc networks,” Network, IEEE, vol. 21, no. 6, pp. 30–38, 2007.[Cross Ref]
    [11] L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile ad hoc routing protocols,” Communications Surveys & Tutorials, IEEE, vol. 10, no. 4, pp. 78–93, 2008.[Cross Ref]
    [12] V. Sharma and A. Vij, "Routing Approach using Machine Learning in Mobile Ad-Hoc Networks," 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2020, pp. 354-358, doi: 10.1109/ICACCCN51052.2020.9362919.[Cross Ref]
    [13] U. Srilakshmi, S. A. Alghamdi, V. A. Vuyyuru, N. Veeraiah and Y. Alotaibi, "A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks," in IEEE Access, vol. 10, pp. 14260-14269, 2022, doi: 10.1109/ACCESS.2022.3144679.[Cross Ref]
    [14] Renu Popli et.al, "Machine Learning Based Security Solutions in MANETs: State of the art approaches," ournal of Physics: Conference Series, Volume 1950, International Conference on Mechatronics and Artificial Intelligence (ICMAI) 2021 27 February 2021, Gurgaon, India.[Cross Ref]

Dr. M. V. Rajesh, P V V S Srinivas, and A. Lakshmanarao (2022), Intensive Analysis of Routing Algorithm Detection over Mobile Ad hoc Network Using Machine Learning. IJEER 10(4), 963-968. DOI: 10.37391/IJEER.100435.