z-logo
open-access-imgOpen Access
A Trusted Method For Early Data Link Failure Prediction
Author(s) -
G. Jegan,
D. Kamalakkannan,
P. Samundiswary
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.e5918.018520
Subject(s) - computer science , shortest path problem , computer network , link (geometry) , protocol (science) , node (physics) , path (computing) , reservation , process (computing) , real time computing , distributed computing , graph , theoretical computer science , engineering , medicine , alternative medicine , structural engineering , pathology , operating system
Mobile ad-hoc network was widely used in the various fields for several applications. In the field of the wireless sensor network the link failure prediction is still a baffling one. The proposal here provides clear facts about the concepts of the link failure. In this paper the Proficient Trusted Node ID Based Resource Reservation Protocol (PT-NIDBRRP) was used. Here the shortest path was detected by using the weighted end-to-end delay based approach. This algorithm will find the short cut route from the particular starting place to the target and can improve the detection rate. By starting the route detection process the sequence numeral and the hop address is added to the protocol. After detecting the shortest path the link failure was detected. The link failure localization structure in the implemented trusted protocol has the higher ability in predicting and fixing the link failure issues. Then to find out the cause attack for the link failure the posterior probability estimation was used to sort out the type of the attack. At last the performance of the proposed method was evaluated through simulation analysis. The simulation result confirms that the proposed methodology is highly effective in detecting the link breakage and the short path algorithm implemented here will reduces the time period of detecting the shortest path. This method provides trusted secure network time duration, energy values and trust scores play an important role between the source and destination in the network.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here