Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extended the range of mobile nodes beyond their level. Now when we talk about wireless communication, routing is the backbone of any communication. Ad hoc on demand multipath distance vector routing algorithm (AOMDV) is a very reactive protocol in MANET’s. We have selected AOMDV algorithm for routing purpose as there have already been done several work with AODV. Also, in AOMDV the end to end delay is reduced by utilising several parallel paths. Various routing attacks have been identified in single path routing but here we have introduced worm hole attack in multi path routing i.e. AOMDV routing algorithm. In this paper, we have studied the performance of AOMDV algorithm under worm hole attack. Also, we have provided security and authentication to each and every node by the use of public key and private key. Different metrics of the proposed protocol has been evaluated from simulation on NS2 on different scenarios i.e. with worm hole attack and without worm hole attack and there has been a noticeable improvement in the throughput and energy consumption is also reduced.
Authors and Affiliations
Richa Gulati , Savita Shivani
Eclat Algorithm for FIM on CPU-GPU co-operative & parallel environment
Abstract: Extracting the frequent itemsets from a transactional database is a fundamental task in data mining field because of its broad applications in mining association rules, time series, correlations etc. The...
Development of a Force Acquisition Instrument for Orthodontics
Abstract : In the field of Orthodontics, various appliances and components are being utilized to facilitate tooth movement. Tissue responses range from physiologic tooth movement to irreversible damage such as pulling at...
Enhancement of Cryptographic Security using Stopping Sets
In this paper, we have used channel codes in cryptographic secrecy. Main idea of this paper is to develop the notion of combined security due to cryptography and channel coding. Thus, it is providing a more complet...
Handwritten Bangla Character Recognition Using Artificial Neural Network
Abstract: This paper presents a system for recognizing Bangla handwritten characters using Artificial Neural Network based on Multi Layer Perceptron classifier. The Bangla alphabets Sorborno and Banjonborno have be...
A Secured Agent-Based Framework for Data Warehouse Management
Managing data warehouses (DWs) is typically characterized by intensive data processing and protracted activities which usually degrade performance. Moreover, DWs are usually designed with the overall objective...