scholarly journals Analysis of Secure Routing Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism

2015 ◽  
Vol 70 ◽  
pp. 341-347 ◽  
Author(s):  
E. Suresh Babu ◽  
C. Nagaraju ◽  
M.H.M. Krishna Prasad

Reliable link between the nodes playsvital role during the transmission of data in the routing protocols of Mobile Adhoc Networks (MANETs). In this research paper, a routing protocol Link named Expiration Time based Routing Protocol (LETSRP)is proposed which uses Winternitz One-time Signature Scheme to checkthe authentication of transmitted data in the network. The packet sending node calculates maximum LET (MaxLET), minimum LET (MinLET) and average LET (AvgLET) using greedy algorithm in our proposed solution. The number of sent packets dependson the available bandwidth. Various steps in implementation are repeated until all the packets reach the destination node. Simulations are done with variable number of nodes between10-20 nodes with mobility setting from 10 m/s to 20 m/s.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2010 ◽  
Vol 2 (2) ◽  
pp. 62-78 ◽  
Author(s):  
Emmanouil A. Panaousis ◽  
Tipu A. Ramrekha ◽  
Grant P. Millar ◽  
Christos Politis

Sign in / Sign up

Export Citation Format

Share Document