ESAODV: IMPLEMENTATION AND DESIGN OF SECURE AND EFFICIENT AODV FOR WSN
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 3
Abstract
A number of different network technologies are now in these days developed using the ad hoc configuration of networks. Among the wireless sensor network is one of most frequently used network technology for application developments. On the other hand the network devices are suffers from the various security and performance issues due to their ad hoc configurations. Therefore the solution for performance improvement and security concerns are required to investigate. In this presented work both the issues are included and a solution for providing efficiency and security is proposed. The proposed solution first performs the clustering in network. This approach keeps in track the performance of network nodes. To perform the clustering of mobile sensor network the weighted clustering approach is implemented. Additionally a malicious behaviour node tracking method is developed using the acknowledgment processing. During this communication the cryptographic manner of communication is used for providing full proof security. Thus the traditional AES algorithm is implemented for data cryptography and for security key exchange the DH algorithm is consumed. The implementation of the proposed routing technique is performed by manipulating the existing routing protocol namely AODV routing protocol. Additionally the simulation of the developed routing technique is demonstrated using the NS2 simulation environment. The experiments are evaluated with respect to the traditional AODV routing protocol under the attack conditions. Further for comparing the performance of both the networks the routing overhead, end to end delay, energy consumption, packet delivery ratio, and throughput is evaluated as the key performance factors. According to the experimentation results the proposed security technique successfully able to distinguish the attacker nodes and improve the performance even when the attacker is present in network.
Authors and Affiliations
Mr. Ojashvi Shivwanshi*
TEXT INFORMATION EXTRACTION USING RULE BASED METHOD
Information is hidden in large volume of files thus it is necessary to find useful information and extract it from file contents. Information Extraction (IE) is the task of automatically extracting structured informati...
EXAMINATION OF THE SCOPE OF ACADEMIC USE ON SMART DEVICE INTHE ISRAELI ACADEMIC ENVIRONMENT
In recent years the phenomenon of using smart devices for studying anytime, anywhere, has grown rapidly. Theobjective of this study is to examine the scope of the academic use of smart devices in the Israeli academ...
OPTIMISED SECURITY FRAMEWORK BASED ON TIME STAMP FOR DOS ATTACKS IN WIRELESS SENSOR NETWORKS
Network performance always dependent on the perfect flow of the data processing packets in network but with attacks in network, performance halted a lot or just degraded at times. Denial of service attack is one o...
Corrosion Inhibitive Potential Of Hibiscus Sabdariffa Calyx Extract For Low Carbon Steel In 0.5M H2SO4 Acid Solution
The inhibitive potential of Hibiscus Sabdariffa calyx extract on low carbon steel corrosion in 0.5M H2SO4 have been investigated by weight loss method which is considered more informative than other laboratory met...
ASSESSMENT OF WATER QUALITY STATUS OF YAMUNA RIVER AND ITS TREATMENT BY ELECTRODE BASED TECHNIQUES
The objective of this study is to reveal the present condition of pollution level of the water of Yamuna River in Delhi due to direct injection of untreated domestic drains and industrial effluents. Very expensive...