ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Broadcasting Probability to Enhance Mobile Ad-hoc Network Using NCPR

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 6)

Publication Date:

Authors : ; ;

Page : 2103-2108

Keywords : Wireless Adhoc network; NCPR; Rebroadcast Delay; Rebroadcast Probability; Security; DES algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The growing demand of wireless portable devices and the recent advances in Mobile Ad-hoc Networks (MANETs) provide a facility that users can benefit from anywhere and in situation of unplanned collaboration and more suitable for disaster relief. MANET consists of collection of mobile nodes which can freely move without any fixed infrastructure and is dynamically self-organized network. In MANET, the nodes move freely in random topology, so there is a high chance of breakage of link between the nodes. This leads to route discoveries and routing overheads and thus for reducing the routing overhead it is imperative to design such a dynamic routing protocol that will reduce the routing overhead and improves the performance scalability. In MANET, there is also have the problem of packets loss, thus showing the limitation of MANET regarding security as there is no any lines of defense in MANET. Hence, providing a secure network for MANET is another challenge. This paper proposes a protocol that will show the objectives of less overheads and good performance. According to a recent survey, authors suggested various routing protocol such as AODV, DSR, but they too have some limitations. In the proposed NCPR system, it will help to reduce routing overhead and increase in performance. In NCPR, protocol need to calculate the two factors i. e. rebroadcast delay and rebroadcast probability. Additionally, it is proposed to implement the Data Encryption Standard (DES) algorithm for security purposes i. e. use the security key. After sharing the key, the source node can encrypt the data by using DES algorithm. Encrypted data can be transferred from source to destination

Last modified: 2021-06-30 21:49:27