International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 6 | Issue 4 | Year 2016 | Article Id. IJCOT-V34P311 | DOI : https://doi.org/10.14445/22492593/IJCOT-V34P311

Design and Implementation of Secure LAR Routing Protocol in MANETs


Y.V.S.Sai Pragathi, S.P.Setty

Citation :

Y.V.S.Sai Pragathi, S.P.Setty, "Design and Implementation of Secure LAR Routing Protocol in MANETs," International Journal of Computer & Organization Trends (IJCOT), vol. 6, no. 4, pp. 1-3, 2016. Crossref, https://doi.org/10.14445/22492593/IJCOT-V34P311

Abstract

MANET is a collection of mobile nodes connected by wireless links without infrastructure. Due to inherent properties of MANETs like limited resources, dynamic topology, wireless medium, the possibility of attacks is more. So, there is a need for provisioning of security in Manets. Different cryptographic algorithms are investigated and Secure LAR is designed. From the results it is found that Secure LAR(S-LAR) with ECC provides security with minimum energy consumption.

Keywords

MANETs, LAR, ECC, RSA, Secure LAR, NS2, Encryption Algorithms.

References

[1] S.Giordan and W.W.Lu, “Challenges in mobile ad hoc networking”, IEEE Communications Magazine, vol.39, no.6,pp. 129-181, June 2001.
[2] Book: Silvia Giordano, Stefano Basagni, Marco Conti and Ivan Stojmenovic, Mobile adhoc networking, Pg.no 286.
[3] Y.Ko and N.H.Vaidya, “Location-aided routing (LAR) in mobile ad hoc networks,” in Proc. of the ACM/ IEEE International Conference on Mobile Computing and Networking (Mobicom), 1998, pp. 66–75.
[4] Vasil Hnatyshin and Malik Ahmed “A comparative study of location aided routing protocols for MANET”, IEEE, 978-1-4577-2028-4/11 2011.
[5] Y.V.S.Sai Pragathi and S.P. Setty, “Hybrid anonymous location-aided routing protocol for privacy preserving and authentication in manet”, Journal of Theoretical and Applied Information Technology, Vol.55, No.2, Sep.2013.
[6] M.Uma and Dr.G.Padmavathi, “A comparative study and performance evaluation of reactive quality of service routing protocols in mobile ad hoc networks” JATIT, Vol.6, No.2, 2009
[7] P.ChannaReddy, “Performance Analysis of Ad hoc network routing protocols, IEEE 2006”, 1-4244-0731-1/06.
[8] https://en.wikipedia.org/wiki/RSA_(cryptosystem)
[9] https://en.wikipedia.org/wiki/Elliptic_curve_cryptography
[10] Network Simulator -2, http://www.isi.edu/nsnam/ns/.