NEW SECURITY ALGORITHM FOR MOBILE ADHOC NETWORKS USING ZONAL ROUTING PROTOCOL
#1



[attachment=7823]

G.Varaprasad1, S. Dhanalakshmi2, M. Rajaram3
1Department of Computer Science and Engineering, B.M.S. College of Engineering, Bangalore, India.
2Department of Computer Applications,
Dr. Mahalingam College of Engineering and Technology, Pollachi, India
3Department of EEE/ECE, Thanthai Periyar Govt. Institute of Technology, Vellore, India





ABSTRACT
Mobile adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile adhoc network, it is much more vulnerable to attacks than a
wired network due to its limited physical security, volatile network topologies, power-constrained operations, intrinsic requirement of mutual trust among all nodes in underlying protocol design and lack of
centralized monitoring and management point. The main aim of this work is to provide secure data
transmission between the source and destination. The simulation is carried out for different number of mobile nodes using network simulator with the help of 1000 mobile nodes. We have compared this model with the existing models such as DSR and AODV. This model has shown the better results in terms of packet delivery, packet drop, and delay. The proposed model has dropped 19% of the packets even if network has five malicious nodes.



INTRODUCTION

In recent years, Mobile Adhoc Network(MANET) has received marvelous attentions due to self-design, self-maintenance, and cooperative environments. In MANET, all the nodes are mobile nodes and the topology will be changed rapidly. The structure of the MANET. Here, the mobile devices such as PDAs and laptops are used to route the data packets. In MANET, all the nodes are actively discovered the topology and the message is transmitted to the destination over multiple-hop. Usually, the endpoints and routers are indistinguishable in MANET. It uses the wireless channel and asynchronous data transmission through the multiple-hop. The vital characteristics of MANETs are lack of infrastructure, dynamic topology, multi-hop communication and distributed coordination among all the nodes.
The end-nodes are enabling QoS such as end-to-end delay, packet-loss, throughput and secure data transmission. The potential deployment of MANETs exists in many scenarios, for example in situations where the infrastructure is not feasible such as disaster relief and cyclone, etc. The MANETs have potential of realizing a free, ubiquitous, and Omnidirectional communication.
The wireless channels can be accessible for both legitimate users and malicious users. In such environment, there is no guarantee that a route between the two nodes will be free for the malicious users, which will not comply with the employed protocol. The malicious users will attempt to harm the network operations. The primary focus of this work is to provide secure data transmission between the mobile nodes. Rest of the paper is organized as follows. Some of the existing models are presented in section 2.

Section3 presents the proposed model and its functions. Simulation of proposed model is discussed in section 4. Results of this model are presented in section 5. Finally, section 6 presents the conclusions and future work.



EXISTING WORK

The secure routing algorithms in wireless communication are addressed and have been suggested for increasing the security levels[4]. However, these algorithms are unable to protect the network from attackers, who acquired the key information[5]. J.Li et al[6] proposed a common key encryption mechanism for MANETs using Dynamic Source Routing(DSR). Drawback of this model is that it dropped more packets even if the network had few malicious users[7]. Adhoc On-Demand Distance Vector(AODV), which is used to provide secure and reliable data transmission over the MANETs[8]. Several strategies are used to detect the non-cooperate nodes while forwarding the data packets to the destination[9]. In[10], authors discussed a trusted approach to establish the communication between the mobile users. Here, the communication takes place based on the watch dog. The trusted values are represented from -1 to +1.
A black hole attack is a kind of denial of service where a malicious node can attract all packets by falsely claiming a fresh route to the destination and then absorb them without forwarding them to the destination[11]. Smith et al[12] examined the routing security of distance vector protocols in general and developed countermeasures for vulnerabilities by protecting both routing messages and routing updates. They propose sequence numbers and digital signatures for routing messages and updates as well as including predecessor information in routing updates.




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: multicast routing for mobile adhoc networks seminar report, different protocol on demand and table in adhoc in ppt, routing protocol algorithm, zonal routing protocol program in java, project on a servey of quality of services routing protocol for mobile adhoc network, base paper for dynamic address routing for scalable adhoc and mesh networks, what are the topics to be covered in integrated adhoc with mobile ip networks in seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  APRIORI Algorithm project report helper 1 10,884 07-02-2019, 10:19 AM
Last Post:
  network security seminars report computer science technology 14 20,385 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 42,024 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,177 07-10-2016, 09:02 AM
Last Post: ijasti
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,612 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  broadband mobile full report project topics 7 23,322 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,816 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 27,939 01-05-2015, 03:36 PM
Last Post: seminar report asees
  Mobile Train Radio Communication Electrical Fan 5 14,707 11-03-2015, 07:27 PM
Last Post: Guest
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,546 26-02-2015, 08:03 PM
Last Post: Guest

Forum Jump: