Reliable Data Transmission Model for Mobile Ad Hoc Network Using Sign cryption Technique

Abstract : In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc net-works (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a number of security challenges due to self-configuration and maintenance capabilities. Besides, traditional security solutions for wired networks are ineffective and inefficient because of the nature of highly dynamic and resource-constrained MANETs. In this paper, the researchers focus on improving reliable data transmission with high security in the MANET using an optimization technique. In the proposed MANET system, the nodes are clustered by utilizing an energy-efficient routing protocol. Then, the modified discrete particle swarm optimization is used to select the optimal cluster head. A secured routing protocol and a sign cryption model can be used to improve the transmission security of the reliable MANET. The sign cryption algorithm encrypts the digital signature, which can enhance the overall efficiency and confidentiality. The security-based analysis is performed on the basis of packet delivery ratio, energy consumption, network lifetime, and throughput. Finally, the result demonstrates that the MANET with optimization techniques achieves a high transmission rate and improves the reliable data security.
 EXISTING SYSTEM :
 A mobile ad hoc network (MANET) is a collection of two or more nodes equipped with wireless communications and networking capability. The nodes within the radio range can immediately communicate with each other. The nodes that are not within each other‘s radio range can communicate with the help of intermediate nodes where the packets are relayed from source to destination. Each node should be configured with an unique identity to ensure the packets correctly routed with the help of a routing protocol of a MANET AODV is a reactive protocol that provides route on demand basis between nodes very efficiently.
 DISADVANTAGE :
 ? Clustering in the MANET is considered as an non-deterministic polynomial-time-hard problem, various optimization algorithms can provide solutions to this problem. ? The reliability problems may influence the information, thus making it undermined/data misfortune because of the absence of correspondence. ? Steering overhead is the principle issue with course disclosure ? Mobility and energy efficiency issues led to the development of a clustering approach motivated by a multi operator stochastic parallel search system of PSO.
 PROPOSED SYSTEM :
 We propose an ID based Secure AODV that securely discovers and maintains the route. In our work we have assumed two levels of security: high and low. The proposed routing protocol is based on AODV routing protocol. We also observe that the secure routing protocols may not ensure secure data delivery at transport layer of OSI architecture. we also present a technique to secure the three-way handshaking process of Transmission Control Protocol (TCP).
 ADVANTAGE :
 ? The purpose of trust evaluation in the MANET is to improve the security of the data transfer process. ? The CH is chosen based on the authenticated SN with maximum energy and TV. ? The distance among the CM and CH is estimated using particles (MDPSO). ? The use of an SRP also ensures the avail-ability and reliable security of the data with readability from end to end. ? The proposed model analyzed the number of attackers with the performance evaluation process.

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com