ESAODV: IMPLEMENTATION AND DESIGN OF SECURE AND EFFICIENT AODV FOR WSN
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 3)Publication Date: 2016-03-30
Authors : Rahul Patel; Preetika Saxena;
Page : 310-321
Keywords : Performance Improvement; Security; Black Hole; Gray Hole; Weighted Clustering Algorithm;
Abstract
A number of different network technologies are now in these days developed using the ad hoc configuration of networks. Among the wireless sensor network is one of most frequently used network technology for application developments. On the other hand the n etwork devices are suffers from the various security and performance issues due to their ad hoc configurations. Therefore the solution for performance improvement and security concerns are required to investigate. In this presented work both the issues are included and a solution for providing efficiency and security is proposed. The proposed solution first performs the clustering in network. This approach keeps in track the performance of network nodes. To perform the clustering of mobile sensor network th e weighted clustering approach is implemented. Additionally a malicious behaviour node tracking method is developed using the acknowledgment processing. During this communication the cryptographic manner of communication is used for providing full proof se curity. Thus the traditional AES algorithm is implemented for data cryptography and for security key exchange the DH algorithm is consumed. The implementation of the proposed routing technique is performed by manipulating the existing routing protocol name ly AODV routing protocol. Additionally the simulation of the developed routing technique is demonstrated using the NS2 simulation environment. The experiments are evaluated with respect to the traditional AODV routing protocol under the attack conditions. Further for comparing the performance of both the networks the routing overhead, end to end delay, energy consumption, packet delivery ratio, and throughput is evaluated as the key performance factors. According to the experimentation results the proposed security technique successfully able to distinguish the attacker nodes and improve the performance even when the attacker is present in network
Other Latest Articles
- NUMERICAL INVESTIGATION OF NUCLEATE BOILING HEAT TRANSFER ON THIN SUBSTRATES UNDER THE INFLUENCE OF SURFACE ROUGHNESS
- INDENTATION OF SANDWICHES USING A LAYERWISE MODEL WITH FIXED DEGREES OF FREEDOM
- OPTIMIZING THE PERFORMANCE OF THERMAL POWER PLANTS
- A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE WITH KEY AGGREGATE SEARCHABLE ENCRYPTION
- IMPACT OF IMPLANT PITCH AND LENGTH VARIATION ON STRESS INTENSITY AROUND DEN TAL IMPLANT - BONE INTERFACE - BY 3D FINITE ELEMENT ANALYSIS
Last modified: 2016-03-08 14:52:07