Esaodv: Implementation And Design Of Secure And Efficient Aodv For Wsn

Mr. Ojashvi Shivwanshi, Mr. Rahul Patel, Miss Preetika Saxena
2016 Zenodo  
A number of different network technologies are now in these days developed using the ad hoc configuration of networks. Among the wireless sensor network is one of most frequently used network technology for application developments. On the other hand the network devices are suffers from the various security and performance issues due to their ad hoc configurations. Therefore the solution for performance improvement and security concerns are required to investigate. In this presented work both
more » ... e issues are included and a solution for providing efficiency and security is proposed. The proposed solution first performs the clustering in network. This approach keeps in track the performance of network nodes. To perform the clustering of mobile sensor network the weighted clustering approach is implemented. Additionally a malicious behaviour node tracking method is developed using the acknowledgment processing. During this communication the cryptographic manner of communication is used for providing full proof security. Thus the traditional AES algorithm is implemented for data cryptography and for security key exchange the DH algorithm is consumed. The implementation of the proposed routing technique is performed by manipulating the existing routing protocol namely AODV routing protocol. Additionally the simulation of the developed routing technique is demonstrated using the NS2 simulation environment. The experiments are evaluated with respect to the traditional AODV routing protocol under the attack conditions. Further for comparing the performance of both the networks the routing overhead, end to end delay, energy consumption, packet delivery ratio, and throughput is evaluated as the key performance factors. According to the experimentation results the proposed security technique successfully able to distinguish the attacker nodes and improve the performance even when the attacker is present in network.
doi:10.5281/zenodo.47043 fatcat:5gz3bkwmxfbhhjmwl246b24yxi