Abstract
Background and Objectives: The present issues faced by the transport systems include enormous traffic jams and congestion, unexpected road accidents, unwanted time delays, pedestrians' crossings on main roads, wastage of fuel, and many more. ITS and some other technologies work together to overcome such factors contributing to a much more desirable transport system. This paper aims to identify the security measures that could increase the security of the routing protocol and improve the performance of the DSR routing protocol. If the number of establishing links is frequently broken, then the performance of the DSR routing protocol is not very good. A new modified DSR algorithm has been designed that would help in reducing the network overhead and increase the network quality. A comparison between the performances of both algorithms has also been studied, and the results show that improved DSR routing protocol has better efficiency in parameters like end-to-end network load delays and packet delivery ratio.
Methods & Materials: The paper mainly focuses on securing the Dynamic Source routing algorithm by designing its modified version and simulating it. We have Proposed Modified DSR and discussed so far that the basic functionality of the DSR algorithm, its advantages and disadvantages. The main drawbacks include the end-to-end Delay, network overhead and packet delivery ratio. Following is a modified version of the dynamic source routing algorithm, which tries to overcome all the limitations of the basic algorithm at a certain level. In the Dynamic Source Routing algorithm, the Route Maintenance phase is used for the successful propagation of the packet within the network. The nodes that are involved in the transmission acknowledge the receiving of the packet to the preceding node.
Results and Discussion: The present study aims at modifying the existing algorithm and designing a new modified algorithm that has less routing overhead, less Delay in packet transmission and high network quality. Modified DSR routing algorithm is examined on the parameters like E-2-E delay, Normalize Routing Overhead, PDR. When we compare the performance of the proposed method with the Existing protocol AODV, and DSR at a number of nodes equal to 50 then we get the Proposed DSR, which has the least end-to-end delay among all the three protocols.
Conclusion: In this paper, acomparison of Exiting DSR and Modified DSR in terms of end-to-end Delay, routing load and packet delivery ratio is made. After studying the readings, the conclusion drawn was that there is less network overhead and a high delivery ratio in modified DSR as compared to the existing DSR algorithm. The corrupted and destroyed packets are detected by the receiver, and in DSR, the mobility of mobile nodes is moderate. Under certain conditions, bidirectional and unidirectional links can be accepted. DSR routing protocols are highly dependent on the parameters such as area size, packet size, packet type, and others.
Keywords: MANET, VANET, routing protocols, security attacks, authentication, verification node, disjoint paths, DSR.
Graphical Abstract
[http://dx.doi.org/10.1080/09720510.2019.1618519]
[http://dx.doi.org/10.1109/VETECF.2007.22]
[http://dx.doi.org/10.14257/ijhit.2015.8.7.30]
[http://dx.doi.org/10.1016/j.adhoc.2018.11.006]
[http://dx.doi.org/10.1016/j.adhoc.2016.10.011]
[http://dx.doi.org/10.1016/j.adhoc.2016.07.004]
[http://dx.doi.org/10.7763/JACN.2015.V3.155]
[http://dx.doi.org/10.1109/CONFLUENCE.2017.7943177]
[http://dx.doi.org/10.1109/CCI.2016.7778893]
[http://dx.doi.org/10.1007/978-3-319-64719-7_18]
[http://dx.doi.org/10.1109/TST.2016.7787005]
[http://dx.doi.org/10.2174/1872212112666180601090209]
[http://dx.doi.org/10.2174/1872212112666180731114046]
[http://dx.doi.org/10.2174/1872212111666170614115605]
[http://dx.doi.org/10.1109/TVT.2015.2406877]
[http://dx.doi.org/10.1109/GLOCOM.2018.8647216]
[http://dx.doi.org/10.5121/ijasuc.2014.5201]
[http://dx.doi.org/10.5120/cae2015651598]
[http://dx.doi.org/10.2174/1872212114999200512120211]
[http://dx.doi.org/10.4018/978-1-5225-3981-0.ch007]
[http://dx.doi.org/10.2174/1872212111666170808104744]
[http://dx.doi.org/10.1080/09720510.2018.1471258]
[http://dx.doi.org/10.1109/IndiaCom.2014.6828071]
[http://dx.doi.org/10.1016/j.comnet.2014.11.002]
[http://dx.doi.org/10.1109/ICTUS.2017.8286119]
[http://dx.doi.org/10.1109/TVT.2013.2285118]
[http://dx.doi.org/10.1109/TIFS.2013.2277471]
[http://dx.doi.org/10.1016/j.ins.2012.07.004]