http://www.ijrcct.org/index.php/ojs/article/view/604/pdf
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Mobile Ad hoc Network (MANET) is a self creating, self-configuring and self healing network that is formed automatically by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Security has become a primary concern in order to provide protected communication in wireless as well as wired environment. In recent years mobile ad hoc networks (MANETs) have received tremendous attention because of their self-configuration and selfmaintenance capabilities. The various attacks which are likely to occur in MANET are blackhole attack, grayhole attack, replay attack, wormhole attack, rushing attack, and etc. In this research paper an attempt is made to find a solution for this challenge by implementing data integrity using hash chain mechanism on hop to hop basis and confidentiality using digital signatures on end to end basis. The light weight Elliptic curve cryptography (ECC) is used to generate the digital signatures. In this research paper an attempt is made to find a solution for this challenge by introducing a new routing protocol called Elliptic Curve Cryptography Enabled AODV (ECCEA) as an extension to the conventional Ad-hoc On-demand Distance Vector (AODV) routing protocol. The proposed routing protocol is simulated by using the discrete event network simulator NS-2 and performance evaluation is carried out by calculating the QOS parameters such as Packet Delivery Ratio, Average End-to-End Delay, Throughput, and Normalized Overhead.
Authors and Affiliations
B. Prabhakara Reddy, Dr. M. N. Giri Prasad
Data Mining Approach To Analyze Virtual Museums Web Log Data
Virtual museums are part of digital libraries with large collections of multi dimensional data. Knowledge engineering tools facilitate extraction of meaningful information to support data mining features such as clas...
Power Optimization for a Datapath of A Genral Purpose Processor
Data path is the core of the processor; it is where all computations are performed. The other blocks in the processor are supporting units. At present, most of the popular processor hardware synthesis tools give highe...
Performance Comparison of Multi-resolution Wavelet Transforms to Hybrid Transforms for Image Compression
This paper proposes multi-resolution based image compression method. Wavelets have ability to analyze the signal at different resolutions to give different levels of details in the image. This property has been used i...
Faults Identification by Passing Test Packets Through Efficient Tool In Network
ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maxim...
Stategy And Necessity Trades For Smile Networks
The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed user...