ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.10, No. 8)

Publication Date:

Authors : ; ; ;

Page : 80-92

Keywords : Network Simulator; Secure Route; Multi-Hop Wireless Network; Routing Protocol; Packets;

Source : Downloadexternal Find it from : Google Scholarexternal


To run wireless nodes capable of data transmission over a wireless connection. Consequently, selecting the optimal paths between both the network entities are challenging, and this network type is known as a multi-hop wireless network (MHWN). Many researchers have been researching this problem and have offered routing protocols to aid nodes in discovering optimal multi-hop routes. The military, the healthcare industry, and national security are just a few sectors that benefit from multi-hop wireless networks. The data transmission needs of such applications are severe and crucial, necessitating a specific level of accuracy and security. Since the devices in a multi-hop network have fewer resources like memory and power, securing data transmission is complex. Here, we offer a safe and efficient routing protocol. Choosing a safe route between the source and the destination is crucial to this concept since it will increase the network's performance and security. We propose generating a standard key between the data's origin and destination to secure the data's transport. We offer considering the power of the intermediary nodes along the chosen route, as the devices need limited energy. Extensive simulations are done in the Network Simulator to examine the effectiveness of the suggested protocol. Edge latency, overhead, and infected device counts are examined considering Secured Ad-Hoc On-Demand Route Discovery (SAHODV).

Last modified: 2022-09-23 21:23:03