Professional Documents
Culture Documents
I. INTRODUCTION
II. MANET
CHARACTERISTICS OF MANET
16
RREQ Messages
RREQ message is broadcasted when a node is in
need to find a route to a destination. If a node is not
in range with a node it communicates, it sends a
RREQ message to its neighbors [4]. The RREQ
contains source IP address, sequence number and
destination IP address as well as the lifespan of
RREQ. If a neighbor of the source does not know
the route to destination, it rebroadcasts the RREQ
to its nearby nodes.
RREP Messages
RREP messages are used to finalize the routes.
When a RREQ reaches a destination node, the
route to destination is made accessible by sending a
RREP back to the source node. At last a node
which generates a RREP is itself the destination. It
has an active route from source to the destination.
As the RREP reached back to the source node, their
routing tables are updated by the intermediate
nodes.
RERR Messages
It is broadcasted when a node detects that a link
with its adjacent neighbor is broken or failure.
Hello Messages
This message is used for broadcasting information
about node connectivity. If a neighbor node does
not receive any packets like Hello messages then
the node will assume that the link to this neighbor
is currently lost.
HYBRID ROUTING
This protocol combines the schemes of proactive
and reactive routing. Examples of hybrid routing
protocols are ZRP (Zone Routing Protocol) and
EIGRP (Enhanced Interior Gateway Routing
Protocol).
In [5] ZRP, within a local neighborhood each node
maintains route to destination. Each node finds its
own neighborhood nodes which it calls a routing
zone. The protocols proactive part is restricted to a
small neighborhood of a node and reactive part is
used for routing across the network. This tends to
reduce the latency in route discovery and the
number of control messages as well. In order to
maintain the route, repairing a broken link requires
establishing a new path between the nodes.
The types of routing in ZRP includes intra zone and
inter zone routing. In intra zone routing each node
collects information about all the nodes in its
routing zone in proactive manner the packet is
transmitted within the routing zone of the source
All Rights Reserved 2016 IJORAT
ENCRYPTION
It is the process of transforming the original
data in to cipher text. It makes the data unreadable
by unauthorized users for the purpose of preventing
others from gaining access to its contents.
The results are obtained with ns3 software are
shown below:
DECRYPTION
It is the process of transforming encrypted
data back into plain text. This is a method of unencrypting the data manually using the proper
codes or keys. The time taken for the packet
transmission during decryption by using AES,
DES, RSA are shown below:
II. Decryption
Size
153
196
312
868
AES
1
1.4
1.6
1.8
DES
1.1
1.2
1.3
1.4
RSA
4.9
5.9
5.1
5.1
AES
2.1
3.2
1.4
5.1
DES
6.5
5.4
6.1
5.8
RSA
8.9
11.2
7.8
9.3
19
VI. CONCLUSION
As security plays a vital role in wireless sensor
networks, its very important to make the network
to be secure. Hence various cryptographic methods
are used along with various routing protocols. Here
we used the ns3 software to get the simulation
results. In some wireless sensor networks attackers
tends to reduce the throughput by dropping the
packets, and this packet dropping tends to increase
the delay and increase the packet loss in the
network. But throughput plays a vital role in
wireless sensor networks. In order to increase the
throughput, here cryptographic techniques are
included with RSA, AES, DES, MD5 and Public
key cryptography. This technique depends on
database system where cryptographic key
techniques are updated. Hence attacker finds it
difficult to determine the technique. Here we
achieved packet broadcasting with moving sensor
node and routing technique is updated with
database. Thereby secured routing is achieved by
increasing the throughput and packet delivery ratio.
REFERENCES
[1] M. Li, Z. Li, and A. V. Vasilakos, A survey on
topology control in wireless sensor networks: Taxonomy,
comparative study, and open issues, Proc. IEEE, vol.
101, no. 12, pp. 25382557, Dec. 2013.
[2] Nor Surayati Mohamad Usop, Azizol Abdullah,
Ahmad Faisal Amri Abidin, Performance Evaluation
20