Open Access   Article Go Back

Performance Modelling of Secure Routing Protocol in Communication Network

Mukesh Dixit1 , Sarvottam Dixit2 , Ajay Kumar Sachan3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 242-251, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.242251

Online published on Nov 30, 2018

Copyright © Mukesh Dixit, Sarvottam Dixit, Ajay Kumar Sachan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mukesh Dixit, Sarvottam Dixit, Ajay Kumar Sachan, “Performance Modelling of Secure Routing Protocol in Communication Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.242-251, 2018.

MLA Style Citation: Mukesh Dixit, Sarvottam Dixit, Ajay Kumar Sachan "Performance Modelling of Secure Routing Protocol in Communication Network." International Journal of Computer Sciences and Engineering 6.11 (2018): 242-251.

APA Style Citation: Mukesh Dixit, Sarvottam Dixit, Ajay Kumar Sachan, (2018). Performance Modelling of Secure Routing Protocol in Communication Network. International Journal of Computer Sciences and Engineering, 6(11), 242-251.

BibTex Style Citation:
@article{Dixit_2018,
author = {Mukesh Dixit, Sarvottam Dixit, Ajay Kumar Sachan},
title = {Performance Modelling of Secure Routing Protocol in Communication Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {242-251},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3151},
doi = {https://doi.org/10.26438/ijcse/v6i11.242251}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.242251}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3151
TI - Performance Modelling of Secure Routing Protocol in Communication Network
T2 - International Journal of Computer Sciences and Engineering
AU - Mukesh Dixit, Sarvottam Dixit, Ajay Kumar Sachan
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 242-251
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
808 279 downloads 206 downloads
  
  
           

Abstract

A mobile ad hoc network is not a wired network it’s a wireless network that uses multiple hops, peer-to-peer routing in its place of motionless network infrastructure to present network connectivity which is used by consumer for communication. Here, we are discussing and designing newest MANET routing protocols along with is comparisons from previous routing protocol as well as discussed improve version of MANET routing protocols e. g. DYMO is the extended version of AODV and Encrypted DYMO(E-DYMO) is improved version of proposed DYMO; earlier than some routing protocols are synchronized by simulations. Network Simulator (Version 2) present a extremely modular platform intended for wired as well as wireless simulations following different - different network essentials, traffic, protocols, along with routing types. In this work, we get the simulation results in terms of various parameters like throughput, PDR, and E2E delay in terms of security of routing protocol. We also describe comparisons between Enhance DYMO, E-DYMO and proposed DYMO in terms of given parameter as well as shows that the enhance the security of various parameters along with proposed DYMO.

Key-Words / Index Term

MANET, AODV, Proposed DYMO, E-DYMO, Security

References

[1]. H. Deng, W. Li and D. P. Agrawal, “Routing Security in Wireless Ad Hoc Networks”. University of Cincinnati, IEEE Communication Magazine, October 2002.
[2]. C. Siva Ram Murthy and B. S. Manoj “ad hoc wireless network, architectures and protocol.
[3]. Perkins, Charles E. Ad hoc networking. Vol. 1. Reading: Addison-wesley, 2001.
[4]. B. Dahill, B. N. Levine, E. Royer and C. Shields. Aran: A secure routing protocol for ad hoc networks. Technical Report UMass Tech Report 02-32, University of Massachusetts, Amherst, 2002.
[5]. L. Zhou, Z.J. Haas, Securing ad hoc networks, IEEE Network 13 (6) pp.24–30, 1999.
[6]. A. Perrig, R. Szewczyk, V. Wen, D. culler, J. Tygar, SPINS: security protocols for sensor networks, in: Seventh Annual ACM InternationalConference on Mobile Computing and Networks Mobicom 2001), Rome, Italy, July 2001.
[7]. D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed sensor network security, NAI Labs T.R. #00-010, 1 June 2000.
[8]. Shrestha, Ashish, and Firat Tekiner. "On MANET routing protocols for mobility and scalability." In Parallel and Distributed Computing, Applications and Technologies, 2009 International Conference on, pp. 451-456. IEEE, 2009.
[9]. Johansson, Per, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. "Scenario-based performance analysis of routing protocols for mobile ad-hoc networks." In Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 195-206. ACM, 1999.
[10]. Sethi, Srinivas, and Siba K. Udgata. "Scalable Cluster Based Ad hoc On-demand distance vector routing protocol for MANET." In Wireless Communication and Sensor Networks (WCSN), 2010 Sixth International Conference on, pp. 1-6. IEEE, 2010.
[11]. Park, V and Corson, S “Temporally - Ordered Routing Algorithm (TORA) Version 1 Functional Specification”. IETF MANET Working Group, 2001.
[12]. R. Dube, C.D. Rais, K-Y.Wang and S.K. Tripathi, ―Signal Stability-Based Adaptive Routing (SSA) for Ad-Hoc Mobile Networks‖, IEEE Personal Communications journal, February 1997.
[13]. Gupta, Jyoti. "Survey on Different Approaches of Detection of Gray Hole Attack in MANET." 2017.
[14]. Johansson, Per, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. "Scenario-based performance analysis of routing protocols for mobile ad-hoc networks." In Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 195-206. ACM, 1999.
[15]. Singh, Ajay Vikram, and Moushumi Chattopadhyaya. "Mitigation of DoS attacks by using multiple encryptions in MANETs." In Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on, pp. 1-6. IEEE, 2015.
[16]. Shengming Jiang, Dajiang He and Jianqiang Rao “A Prediction-Based Link Availability Estimation for Routing Metrics in MANETs”, IEEE Transactions on Networking, Vol. 13, No. 6, December 2005.
[17]. A. Perrig, R. Szewczyk, V. Wen, D. culler, J. Tygar, SPINS: security protocols for sensor networks, in: Seventh Annual ACM InternationalConference on Mobile Computing and Networks Mobicom 2001), Rome, Italy, July 2001.
[18]. Gowda, Sumati Ramakrishna, and P. S. Hiremath. "Review of security approaches in routing protocol in mobile adhoc network." International Journal of Computer Science Issues (IJCSI) 10, no. 1 (2013).