Open Access   Article Go Back

An Improved Security Network Life Based on Data Ant Colony Optimization Method Used in Wireless Mesh Network

Paramjit Kaur1 , RakeshKumar 2 , Harinder Kaur3

  1. Department of CSE,SECG, Gharuan, India.
  2. SECG, Gharuan, India.
  3. Department of CSE, SECG, Gharuan, India.

Correspondence should be addressed to: rakesh77kumar@yahoo.com.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 50-56, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.5056

Online published on Mar 30, 2018

Copyright © Paramjit Kaur, RakeshKumar , Harinder Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Paramjit Kaur, RakeshKumar , Harinder Kaur, “An Improved Security Network Life Based on Data Ant Colony Optimization Method Used in Wireless Mesh Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.50-56, 2018.

MLA Style Citation: Paramjit Kaur, RakeshKumar , Harinder Kaur "An Improved Security Network Life Based on Data Ant Colony Optimization Method Used in Wireless Mesh Network." International Journal of Computer Sciences and Engineering 6.3 (2018): 50-56.

APA Style Citation: Paramjit Kaur, RakeshKumar , Harinder Kaur, (2018). An Improved Security Network Life Based on Data Ant Colony Optimization Method Used in Wireless Mesh Network. International Journal of Computer Sciences and Engineering, 6(3), 50-56.

BibTex Style Citation:
@article{Kaur_2018,
author = {Paramjit Kaur, RakeshKumar , Harinder Kaur},
title = {An Improved Security Network Life Based on Data Ant Colony Optimization Method Used in Wireless Mesh Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {50-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1759},
doi = {https://doi.org/10.26438/ijcse/v6i3.5056}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.5056}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1759
TI - An Improved Security Network Life Based on Data Ant Colony Optimization Method Used in Wireless Mesh Network
T2 - International Journal of Computer Sciences and Engineering
AU - Paramjit Kaur, RakeshKumar , Harinder Kaur
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 50-56
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
767 600 downloads 285 downloads
  
  
           

Abstract

In wireless technology, the devices communicate with each other without physical connections. It gives together merits and demerits when evaluated to a wireless technology. In this research work, we have studied the DSDV, AODV, DSR and ZRP routing protocol comparison. The encryption technique has implemented the security in the mesh networks. We have implemented the secret key encryption algorithm. This algorithm uses a dissimilar key for encoding and decoding. The decoding key cannot derive from the encoding key. Main focus on this research work as to identify the wormhole attacker node in the network with the help of Secret Encryption Algorithm and prevention using Data Ant Colony Optimization algorithm. We have used the MATLAB 2013a simulation tool with SCRIPT Language. We calculated the performance parameters, i.e. throughput, packet delivery rate, probability distribution vs. time and delay vs. Frame error rate [ms].

Key-Words / Index Term

Wireless Mesh Network, Data Ant Colony optimization, Secret Encryption Algorithm, Wormhole attack and routing protocol.

References

[1]. Torjemen, N.,Zhioua, G.S.M., and Tabbane, N., (2015),"A handover decision algorithm from LTE-advanced to Wireless Mesh Network." In Communications and Networking (COMNET), 2015 5th International Conference on, pp. 1-6. IEEE.
[2]. S. Mewada, UK. Singh and P. Sharma, "A Novel Security Based Model for Wireless Mesh Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.11-15, 2013.
[3]. Wu, P., Li, Y., and Liu, X., (2015),"Capacity-based channel assignment scheme in multi-radio multi-channel wireless mesh networks." Chinese Journal of Electronics 24, no. 2: 419-425.
[4]. Xing, S., Huang, H., and Wang, R., (2015), "Load balanced coding aware multipath routing for wireless mesh networks." Chinese Journal of Electronics 24, no. 1: 8-12.
[5]. Aggeliki, S., and Chatzimisios, P., (2013),"A survey on security and privacy issues in wireless mesh networks." Security and Communication Networks.
[6]. Umesh Kumar Singh, Jalaj Patidar , Kailash Chandra Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[7]. Kato, N., Nishigama,H., and Miura, R., (2015),"Toward fair maximization of energy efficiency in multiple us-aided networks: a game-theoretic methodology." IEEE Transactions on Wireless Communications 14, no. 1 305-316.
[8]. Moh, A.N.A., and Borhanuddin, M.,(2015),"Optimum QoS resource allocation algorithm for video traffic over wireless mesh networks based on IEEE 802.11 s." In Communications (MICC), 2015 IEEE 12th Malaysia International Conference on, pp. 102-106. IEEE.
[9]. Wang, j., and Lu, k., (2016),"ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks." IEEE Transactions on Vehicular Technology 65, no. 9: 7621-7633.
[10]. Sbeiti, M., Goddemeier, N., and Wietfeld, C., (2016),"PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks" IEEE Transactions on Wireless Communications 15, no. 3 : 1950-1964.
[11]. Akilarasu,G., and Shalinie, S.M., (2016),"Worm hole free routing and DoS attack defense in wireless mesh networks." Wireless Networks: 1-10.
[12]. Mayuri, A.V.R., and Subramanyam, M.V., (2015),"MPGA: QOS adequacy latitude aware cooperative spectrum sensing in Cognitive Wireless Mesh Networks by Meticulous Progression based GA." In Power, Control, Communication and Computational Technologies for Sustainable Growth (PCCCTSG), Conference on, pp. 318-325. IEEE.
[13]. Akyildiz, I.F., and Wang, X., (2005),"A survey on wireless mesh networks." IEEE Communications magazine 43, no. 9: S23-S30.
[14]. Neeraj Paliwal , "Relevance Multipath Forwarding in Intended Wireless Mesh Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.2, pp.5-10, 2015
[15]. Soufiane, J., Haqiq, A., and Nassereddin, B., (2015),"Fairness and differentiation of services in wireless mesh network." In Information and Communication Technologies (WICT), 2015 5th World Congress on, pp. 59-66. IEEE.
[16]. Islam, M.J., Nurain,N., and Raghunathan, V., (2016),"Channel Assignment Techniques for Multi-Radio Wireless Mesh Networks: A Survey." IEEE Communications Surveys & Tutorials 18, no. 2: 988-1017.
[17]. Wang, X., Zhang, j., and Zhang, X., (2015),"Monitor Node Selection Algorithm Based on Mutual Information in Wireless Mesh Networks." In Smart City/Social Com/Sustain Com (Smart City), 2015 IEEE International Conference on, pp. 349-353. IEEE.