Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control or centralized administrationis not in this network. Wireless Ad-hoc networks are organized and configured in self mode. Each and every node in this network is set up using a wireless transmitter and a wireless receiver. The networktransmits data with other nodes in its communication range only. When the data are transmitted, the nodes communicate with each other usinga common physical media. The nodes send and receive signals using the same frequency band and by doing so, it follows the same hopping method. If the receiving node is not inside the transmission range, the source node uses the other nodes to transmit the messages hop by hop. For sending a message from one node to another node that is out of its frequency range, it gets the help of other nodes in the network for an effective data transfer. This technique is called as multi-hop communication. Hence, every node acts both as a host and as a router at the same time. Wireless Mobile networks are usually attacked by many sources, such as hackers, intruders and other physical attacks. Creating and configuring a safe and secure wireless ad-hoc network isvery difficult for the reasons such as: the poor quality of communication channels and nodes, poor infrastructure, frequently changing topology and technology.Due to this factors, the wireless channel can be very well and easily accessible by all the network users and the attackers. An attackercan easily break network operations by not following the specifications of network protocol. Hence, a secure protocol is to be created for safe data transfer. Because of frequently varying techniques in the network topology, there is a complexity to routing among the various mobile nodes in a safe way. In this paper, a multi-level encryption methodis suggested for sending the data over a wireless network and this form of methodhelps us to send our secret message in a more secured way over a wireless network.
Authors and Affiliations
Mr. P. Daniel Sundar Raj, Dr. K. Arulanandam
Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trend
Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It u...
A Reconfigurable Model In Wireless Sensor Network for saving wild life
Abstract: The paper presents the design and evaluation of Wireless Sensor Network for prompt detection of forest fires. At first it presents the vital aspects in sculpting forest fires. It is being ensured by s...
Privacy Protection in Distributed Industrial System
Abstract: Although awareness is constantly rising, that industrial computer networks (in a very broad sense)can be exposed to serious cyber threats, many people still think that the same countermeasures, developed...
Real Time Facial Emotion Recognition using Kinect V2 Sensor
Abstract: The emotional facial expression is an important element in human communication, along with otherforms of non-verbal communication, such as gestures and postures. The human facial expression, with itscunni...
Educational Robot Task Virtual Model Transformation Into Real Environment
Abstract: We propose to extend the learning of programming basics in secondary school, creating an educational environment based on using virtual modelling of educational robot task and model’s transformation into real e...