Abstract

A mobile ad hoc network is a group of nodes which are communicating with each other with the use of radio frequencies. When there is high movement of mobile nodes, the nodes find difficult to reach other nodes. If the data are exchanged between nodes when there is high mobility, the data may be lost in transit. Therefore the security of data is needed for the transmission of data. Since the high dense of mobile nodes we cannot give better security, the mobile nodes must be formed as groups. For providing security, there are pre-requirements like key establishment, key agreement and key management and so on. Then these keys are used in the encryption/decryption algorithms such as symmetric key algorithms and asymmetric key algorithms. For this study, we have taken VBOR as the base protocol. VBOR consists of two phases namely, Route discovery and Route maintenance with the use of variable bit rate. In this study, the message authentication code is generated during route discovery phase then these data are exchanged between the nodes. In this proposed work, the performance analysis is done using some performance parameters like energy consumption, packet delivery ratio, overhead and delay.

Highlights

  • Wireless networks are growing rapidly in last few years

  • We have proposed that it sends the whole data with cryptographic parameters along with variable bit rate on-demand routing protocol (VBOR) routing protocol

  • Simulation study has been carried out to show the performance of the proposed secure VBOR protocol

Read more

Summary

Introduction

Wireless networks are growing rapidly in last few years. There are two classifications: Infrastructure based wireless networks and Infrastructure less or ad-hoc wireless networks. Most wireless networks deployed today’s life are IEEE 802.11 Wireless LANs. So there are pre established wired infrastructure for wireless LANs to connect various access points. There are no wired connections in wireless ad hoc networks. Since the nodes are mobile nodes and there are no such pre-existing infrastructure. Nodes with wireless capability form an ad-hoc network in real time. The mobile nodes are working as a normal mobile node and as well as central coordinators which are forwarding the packets from one mobile node and another mobile node. Ad-hoc network is ideal for battlefield or rescuer areas where fixed infrastructure is very hard to deploy

Methods
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.