A MANET Security Using Routing Methodology
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
Wireless networks are growing now in these days and different kind of wireless applications are developed using ad hoc configuration. Mobile ad hoc network is a kind of such wireless network. Due to its ad hoc nature and mobility support the routing protocol played essential role in network. The main responsibility of routing protocol is to create and maintain topology on demand basis. Therefore the ad hoc network is suffers from performance and security issues. Therefore the proposed study investigates the routing protocols supported by mobile ad hoc network and the routing based attack deployment techniques. After analysing them a solution for black hole attack security is provided. The proposed solution involves the implementation of secure route discovery protocol. In order to implement the proposed routing technique traditional AODV routing protocol is modified. The routing protocol is modified in such ways by which the routing path trust value is evaluated and compared for making a decision for malicious path detection. For creating the decisional threshold packet delivery ratio, energy and high sequence number is selected. The implementation and simulation of the proposed routing protocol is performed using network simulator 2. In addition of that the comparative performance study between AODV routing protocol and modified AODV routing protocol is performed. In the comparative study packet delivery ratio and throughput of network is found optimum and better than traditional routing protocol.
Design of a Cleaner Production Framework for Engineering Company: DrinkCo Beverages
Design of a Cleaner Production Framework for Engineering Company: DrinkCo Beverages
Accurate Target Tracking using Kalman Filtering and Location Estimation in Wireless Sensor Networks
Accurate Target Tracking using Kalman Filtering and Location Estimation in Wireless Sensor Networks
Enhancing Security and Response Time for Secure Search in Unstructured Peer to Peer Network
Enhancing Security and Response Time for Secure Search in Unstructured Peer to Peer Network
A Survey on Hierarchical Merge for Hadoop-A
: Hadoop is a popular open source implementation of the Map Reduce programming model for cloud computing. However, it faces a number of issues to achieve the best performance from the underlying systems. These include a...
Wave Transit Time in Polymer-Mortar Composites
The time transmitted between two surfaces of Polymer-Mortar Composites is measured and evaluate the different in percentage of polymer and sand addition and also between two temperatures (at room temperature and when pos...