Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extended the range of mobile nodes beyond their level. Now when we talk about wireless communication, routing is the backbone of any communication. Ad hoc on demand multipath distance vector routing algorithm (AOMDV) is a very reactive protocol in MANET’s. We have selected AOMDV algorithm for routing purpose as there have already been done several work with AODV. Also, in AOMDV the end to end delay is reduced by utilising several parallel paths. Various routing attacks have been identified in single path routing but here we have introduced worm hole attack in multi path routing i.e. AOMDV routing algorithm. In this paper, we have studied the performance of AOMDV algorithm under worm hole attack. Also, we have provided security and authentication to each and every node by the use of public key and private key. Different metrics of the proposed protocol has been evaluated from simulation on NS2 on different scenarios i.e. with worm hole attack and without worm hole attack and there has been a noticeable improvement in the throughput and energy consumption is also reduced.
Authors and Affiliations
Richa Gulati , Savita Shivani
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersive Routes
In a Wireless Sensor Network (WSN), specifically data aggregation reduces the amount of communication and energy utilization. Newly, the research centre has proposed a strong aggregation framework call...
Improving Image Classification Result using Neural Networks
Abstract: Image classification is among the complex processes which depend on several factors. In this paper, the most common existing methods for image classification are compared first and different structures of multi...
Efficient Optimization of Multiple SPARQL Queries
A W3C standard for processing RDF data is a SPARQL query language, a technique that is used to encode data in meaningful manner. We investigate the foundations of SPARQL query optimization by grouping into ind...
Implementing multicast communication system making use of anexisting data network to offer free TV channels
Abstract: This paper discusses how a company can implement multicast communication system making use ofits existing data network to offer free TV channels. The advantages and challenges involved in multicastcommuni...
Alternate Sort
Sorting algorithms are the main concepts of the subject Data Structures and It’s Applications. These algorithms are designed in arranging the data elements in the sorted order. If the data elements are arranged...