http://www.ijrcct.org/index.php/ojs/article/view/604/pdf
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Mobile Ad hoc Network (MANET) is a self creating, self-configuring and self healing network that is formed automatically by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Security has become a primary concern in order to provide protected communication in wireless as well as wired environment. In recent years mobile ad hoc networks (MANETs) have received tremendous attention because of their self-configuration and selfmaintenance capabilities. The various attacks which are likely to occur in MANET are blackhole attack, grayhole attack, replay attack, wormhole attack, rushing attack, and etc. In this research paper an attempt is made to find a solution for this challenge by implementing data integrity using hash chain mechanism on hop to hop basis and confidentiality using digital signatures on end to end basis. The light weight Elliptic curve cryptography (ECC) is used to generate the digital signatures. In this research paper an attempt is made to find a solution for this challenge by introducing a new routing protocol called Elliptic Curve Cryptography Enabled AODV (ECCEA) as an extension to the conventional Ad-hoc On-demand Distance Vector (AODV) routing protocol. The proposed routing protocol is simulated by using the discrete event network simulator NS-2 and performance evaluation is carried out by calculating the QOS parameters such as Packet Delivery Ratio, Average End-to-End Delay, Throughput, and Normalized Overhead.
Authors and Affiliations
B. Prabhakara Reddy, Dr. M. N. Giri Prasad
Design of Efficient DSP operation using 16×16 R-MAC Unit
As we already know that the multiplication and accumulation are the vital operations involved in DSP `applications. In DSP processor we need high speed performance for different applications. In order to increase thi...
Technique to the Data Alignment for Accomplishing Accurate Annotation In Web Databases
Databases turn out to be web reachable all the way through HTML form-based search interfaces. The data units revisit from the essential database typically programmed into the result pages vigorously for human browsin...
Outsourced Similarity Search on Metric Data Assets
Similarity querying of metric data which is stored in cloud is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server fo...
Target Tracking Problem in Mobile Sensor Networks
Target Tracking became a challenging task for the researchers in sensor networks, where it dictates the accuracy of a targets position and is measured. This paper discussed the target tracking problem in a mobile sen...
A Study on Security Advances for LEACH in WSN
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....