Performance Comparison of ABR using EPKCH in MANET

K. Thamizhmaran*, S. Jothi Lakshmi **, M. Hemalatha ***
* Assistant Professor, Department of Electronics and Communication Engineering, Annamalai University, Tamil Nadu, India.
**-*** UG Scholar, Department of Electronics and Communication Engineering, Annamalai University, Tamil Nadu, India.
Periodicity:March - May'2018
DOI : https://doi.org/10.26634/jit.7.2.14648

Abstract

In the recent years, a lot of research has been carried out in Mobile Ad-hoc Networks (MANETs). The main goals and challenges of security are which characterizes the routing protocol of MANET. Any node can join and leave the network routing protocol which is addressed for only efficient path formation, making the same network vulnerable to various attacks. Associativity-based Routing (ABR) is an on-demand routing protocol, i.e., routes are created only as and when needed. Normally, the routes will be available immediately and the routing tables will be updated constantly among the routes. On-Demand routing is chosen here, because it reduces the control packet traffic which is suitable for wireless network due to limited bandwidth. Protocol's dynamic nature enables MANET operation ensuring deployment in extreme/volatile circumstances. This paper proposes an Extended Public Key Cryptography (EPKCH) system. This cryptosystem is mainly designed for securing data during packet forwarding operation and also to detect malicious and selfish nodes during network initializing and packet forwarding operation. Confidentially is the basic feature provided by the public key cryptography, which also provides authentication, non-repudiation and integrity. The protocol is designed to protect the network from malicious and selfish nodes. An extended public key cryptography mechanism is implemented in ABR, in order to achieve security goals for the following parameters Path-Division Routing (PDR), Routing overhead, delay, on-demand routing, packet loss and throughput. The proposed model is stimulated using Network Simulated (NS2).

Keywords

MANET, Routing Protocol, Attacks, ABR, EPKCH, EPKCH-ABR, NS2.

How to Cite this Article?

Thamizhmaran,K., Lakshmi,S.J., and Hemalatha,M. (2018). Performance Comparison of ABR using EPKCH in MANET. i-manager’s Journal on Information Technology, 7(2), 16-21. https://doi.org/10.26634/jit.7.2.14648

References

[1]. Babu, V. G. (2013). Efficient mobility using multicast routing mechanisms. International Journal of Computer Sciences and Engineering, 1(3), 39-46.
[2]. Balakrishna, R., & Rajesh, K. S. (2011). Security Performance Issues on ASRP in MANETS. Research Cell: An International Journal of Engineering Sciences, 5, 113- 132.
[3]. Dalal, T., & Singh, G. (2012). An analysis of ASPR secure routing protocol for MANET. International Journal of Computer Science & Management Studies, 12(2), 132- 137.
[4]. Kumar, G. V., Reddyr, Y. V., & Nagendra, D. M. (2010). Current research work on routing protocols for MANET: A literature survey. International Journal on Computer Science and Engineering, 2(3), 706-713.
[5]. Mawada, S., Singh, U. K., & Sharma, P. (2013). A novel security based model for wireless mesh networks. International Journal of Scientific Research in Network Security and Communication, 1(1), 11-15.
[6]. Murthy, C., & Manoj, B. (2013). Ad-hoc Wireless Networks: Architecture and Protocols. Prentic Hall PTR.
[7]. Mehdi, A. A. (2016). Performance evaluation with throughput, packet delivery on routing protocols in MANETs. International Journal of Advanced Research in Computer Science and Software Engineering, 6(2), 424- 429.
[8]. Nachammai, M., & Radha, N. (2016). Survey on Black Hole and Gray Hole Attacks in MANET. International Journal of Computer Sciences and Engineering, 4(5), 66- 70.
[9]. Pal, L. (2013). Performance analysis of reactive and proactive routing for mobile ad-hoc networks. International Journal of Scientific Research in Network Security and Communication, 1(1), 1-4.
[10]. Pushpneel, V. (2017). Compare and Measure the Efficiency and Throughput of MANET Protocols (Doctoral Thesis, Bhagwant University).
[11]. Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46-55.
[12]. Tirthraj, R., & Verma, A. K. (2009). Survey and Analysis of secure routing protocols for MANETs. In the Proceeding of National Conference on Cutting Edge Computer and Electronics Technology (CECT 2009) (pp. 501-506).
[13]. Wikipedia, (2018). Associativity-based Routing. Retrieved from https://en.wikipedia.org/wiki/Associativitybased_ Routing
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.