Abstract
Adhoc networks as the name suggests is framed for a specialized reason using the volunteering devices available near the source to destination, utilizing the devices in between the source and the destination as the relaying nodes. Several methods were framed to optimize the performance of the wireless adhoc network to retain the energy level of the devices in turn to extend the lifetime of the devices. The cluster based routing seemed to be very promising in terms of energy efficiency, throughput and delay. These cluster based adhoc networks are very much exposed to security breaches as they are not aided with sufficient security. The conveyance taking place between the head of the cluster to base station is often affected by the many attacks from different sources by altering the information or hacking the information. So the paper puts forward the verification code for every data transmitted from the head of the cluster to the base station. The proposed method is validated using the network simulator-2 in the terms of throughput, energy consumption and security in data conveyance and compared with the prevailing methods that bare authentication.
Publisher
Inventive Research Organization
Reference15 articles.
1. [1] Raj, Jennifer S., S. Smys, and G. Josemin Bala. "Performance improvement in manets: a cross layer approach via TCP." International Journal of Recent Trends in Engineering 2, no. 1 (2009).
2. [2] Harikumar, R., and Jennifer S. Raj. "Ad hoc node connectivity improvement analysis–Why not through mesh clients?." Computers & Electrical Engineering 40, no. 2 (2014): 473-483.
3. [3] Ramesh, S., and S. Smys. "Performance analysis of heuristic clustered (HC) architecture in wireless networks." In 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1-4. IEEE, 2017.
4. [4] Smys, S. "ENERGY-AWARE SECURITY ROUTING PROTOCOL FOR WSN IN BIG-DATA APPLICATIONS." Journal of ISMAC 1, no. 01 (2019): 38-55.
5. [5] Raj, Jennifer S., and A. Anto Prem Kumar. "ENERGY EFFICIENT LOCALIZATION AND ROUTING STRATEGY FOR CLUSTER BASED SENSOR NETWORKS."
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献