http://www.ijrcct.org/index.php/ojs/article/view/604/pdf

Abstract

Mobile Ad hoc Network (MANET) is a self creating, self-configuring and self healing network that is formed automatically by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Security has become a primary concern in order to provide protected communication in wireless as well as wired environment. In recent years mobile ad hoc networks (MANETs) have received tremendous attention because of their self-configuration and selfmaintenance capabilities. The various attacks which are likely to occur in MANET are blackhole attack, grayhole attack, replay attack, wormhole attack, rushing attack, and etc. In this research paper an attempt is made to find a solution for this challenge by implementing data integrity using hash chain mechanism on hop to hop basis and confidentiality using digital signatures on end to end basis. The light weight Elliptic curve cryptography (ECC) is used to generate the digital signatures. In this research paper an attempt is made to find a solution for this challenge by introducing a new routing protocol called Elliptic Curve Cryptography Enabled AODV (ECCEA) as an extension to the conventional Ad-hoc On-demand Distance Vector (AODV) routing protocol. The proposed routing protocol is simulated by using the discrete event network simulator NS-2 and performance evaluation is carried out by calculating the QOS parameters such as Packet Delivery Ratio, Average End-to-End Delay, Throughput, and Normalized Overhead.

Authors and Affiliations

B. Prabhakara Reddy, Dr. M. N. Giri Prasad

Keywords

Related Articles

Modeling of Single-Phase Semi-Z-source Inverter

This paper presents several single-phase non-isolated semi-Z-source inverters for small distributed power generator in grid-connected applications with low cost and doubly grounded features. These semi-Z-source invert...

Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment

Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...

Query Clustering method to User profiles

The User profiling is a fundamental component of any personal applications. The several existing user profiling strategies are based on the objects of users are interested in positive references but not negative pref...

Sentiment Analysis Approach for Movie Reviews of Natural Language

Sentimental Analysis (SA) or Opinion Mining (OM) refers to the application of NLP, computational linguistics, and text analytics to identify and extract subjective information in source materials. It involves classif...

Design of Efficient DSP operation using 16×16 R-MAC Unit

As we already know that the multiplication and accumulation are the vital operations involved in DSP `applications. In DSP processor we need high speed performance for different applications. In order to increase thi...

Download PDF file
  • EP ID EP27853
  • DOI -
  • Views 249
  • Downloads 0

How To Cite

B. Prabhakara Reddy, Dr. M. N. Giri Prasad (2014). http://www.ijrcct.org/index.php/ojs/article/view/604/pdf. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27853