A Trusted Method For Early Data Link Failure Prediction
G. Jegan1, D. Kamalakkannan2, P. Samundiswary3
1Dr. G. Jegan*, Department of ECE, MLR Institute of Technology, Hyderabad, India.
2Dr. D. Kamalakkannan, Department of ECE, MLR Institute of Technology, Hyderabad, India.
3Dr. P. Samundiswary, Department of Electronics Engineering Pondicherry, University, Puducherry, India.

Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 2498-2504 | Volume-8 Issue-5, January 2020. | Retrieval Number: E5918018520/2020©BEIESP | DOI: 10.35940/ijrte.E5918.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile ad-hoc network was widely used in the various fields for several applications. In the field of the wireless sensor network the link failure prediction is still a baffling one. The proposal here provides clear facts about the concepts of the link failure. In this paper the Proficient Trusted Node ID Based Resource Reservation Protocol (PT-NIDBRRP) was used. Here the shortest path was detected by using the weighted end-to-end delay based approach. This algorithm will find the short cut route from the particular starting place to the target and can improve the detection rate. By starting the route detection process the sequence numeral and the hop address is added to the protocol. After detecting the shortest path the link failure was detected. The link failure localization structure in the implemented trusted protocol has the higher ability in predicting and fixing the link failure issues. Then to find out the cause attack for the link failure the posterior probability estimation was used to sort out the type of the attack. At last the performance of the proposed method was evaluated through simulation analysis. The simulation result confirms that the proposed methodology is highly effective in detecting the link breakage and the short path algorithm implemented here will reduces the time period of detecting the shortest path. This method provides trusted secure network time duration, energy values and trust scores play an important role between the source and destination in the network.
Keywords: MANET, Proficient Trusted Node ID Based Resource Reservation Protocol, Weighted End-To-End Delay Based Approach, Posterior Probability Estimation..
Scope of the Article: IoT Application and Communication Protocol.