ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 3)

Publication Date:

Authors : ; ;

Page : 310-321

Keywords : Performance Improvement; Security; Black Hole; Gray Hole; Weighted Clustering Algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal


A number of different network technologies are now in these days developed using the ad hoc configuration of networks. Among the wireless sensor network is one of most frequently used network technology for application developments. On the other hand the n etwork devices are suffers from the various security and performance issues due to their ad hoc configurations. Therefore the solution for performance improvement and security concerns are required to investigate. In this presented work both the issues are included and a solution for providing efficiency and security is proposed. The proposed solution first performs the clustering in network. This approach keeps in track the performance of network nodes. To perform the clustering of mobile sensor network th e weighted clustering approach is implemented. Additionally a malicious behaviour node tracking method is developed using the acknowledgment processing. During this communication the cryptographic manner of communication is used for providing full proof se curity. Thus the traditional AES algorithm is implemented for data cryptography and for security key exchange the DH algorithm is consumed. The implementation of the proposed routing technique is performed by manipulating the existing routing protocol name ly AODV routing protocol. Additionally the simulation of the developed routing technique is demonstrated using the NS2 simulation environment. The experiments are evaluated with respect to the traditional AODV routing protocol under the attack conditions. Further for comparing the performance of both the networks the routing overhead, end to end delay, energy consumption, packet delivery ratio, and throughput is evaluated as the key performance factors. According to the experimentation results the proposed security technique successfully able to distinguish the attacker nodes and improve the performance even when the attacker is present in network

Last modified: 2016-03-08 14:52:07