Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Scheme to Maintain Secrecy in Ad hoc Network


Affiliations
1 Department of Computer Engineering, MIT College of Engineering, Pune, India
2 Department of Information Technology, MIT College of Engineering, Pune, India
     

   Subscribe/Renew Journal


Wireless sensor network composed of thousands of nodes. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network using routing protocols. However, due to security vulnerabilities of the routing protocols, the data sent by nodes are unprotected, hence need of security arises. In this paper, we evaluate the performance of multiple routing protocols (AODV, DSDV & DSR) using Random Way Point mobility model .The attempt has been made to enhance the security by encrypting data packets with the variation in packet size. The simulation is carried out using Network Simulator-2 (NS 2).

Keywords

AODV, DSDV, DSR, Mobility Models, NS 2.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 210

PDF Views: 1




  • A Novel Scheme to Maintain Secrecy in Ad hoc Network

Abstract Views: 210  |  PDF Views: 1

Authors

Pragati Patil
Department of Computer Engineering, MIT College of Engineering, Pune, India
B. N. Jagdale
Department of Information Technology, MIT College of Engineering, Pune, India
M. Penurkar
Department of Information Technology, MIT College of Engineering, Pune, India

Abstract


Wireless sensor network composed of thousands of nodes. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network using routing protocols. However, due to security vulnerabilities of the routing protocols, the data sent by nodes are unprotected, hence need of security arises. In this paper, we evaluate the performance of multiple routing protocols (AODV, DSDV & DSR) using Random Way Point mobility model .The attempt has been made to enhance the security by encrypting data packets with the variation in packet size. The simulation is carried out using Network Simulator-2 (NS 2).

Keywords


AODV, DSDV, DSR, Mobility Models, NS 2.