IRO Journals

Journal of IoT in Social, Mobile, Analytics, and Cloud

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Health Record Management System – A Web-based Application
Volume-3 | Issue-4

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Secure Data Sharing Platform for Portable Social Networks with Power Saving Operation
Volume-3 | Issue-3

Review of Internet of Wearable Things and Healthcare based Computational Devices
Volume-3 | Issue-3

Stock Index Prediction with Financial News Sentiments and Technical Indicators
Volume-4 | Issue-3

Hybrid Framework on Automatic Detection and Recognition of Traffic Display board Signs
Volume-3 | Issue-3

Suspicious Human Activity Detection System
Volume-2 | Issue-4

ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3

EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2

Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4

Home / Archives / Volume-2 / Issue-2 / Article-2

Volume - 2 | Issue - 2 | june 2020

The Robust Routing Protocol with Authentication for Wireless Adhoc Networks
Pages: 83-95
Published
07 May, 2020
Abstract

The adhoc networks are the platforms formed for specific reason to attain a specific purpose. It is a communication strategy followed by the wireless devices when or while the actual communication setup is not possible. Any portable device communicating in the wireless medium in a decentralized manner is termed to be a wireless adhoc network. One such device is the wireless-sensors that imitate the aforementioned procedures to send the information from the source to the target falls under the category of the wireless adhoc network, as it communicates through the air in a wireless medium. The rapid proliferation of sensors and growing demand for applications and services from the network formed using such wireless-sensors generate unrivaled appeals for routing data packets on infrastructure of the network formed using the wireless-sensors. Such sensors lays as the fundamental devices in a wide range application and are even more predominant in the internet of things paradigm. Numerous of such devices are used in the internet of things to gather enormous amount of data from a broad range of applications. The sensors used in the internet of thing usually performs the sensed data transmission to the gateway-nodes through the public channel that are insecure for conversing the confidential data. So the routing with authentication becomes essential, to make the routing robust and long lasting it is necessary to develop a light weight authentication scheme that does not consume too much of the energy of the network of the wireless-sensors. To handle this problem the paper concatenates the unique key generation technique the mid-square (MidS) with the Beziers curve based authentication (UKHA) to secure and authenticate the routing between the wireless-sensor networks framed in adhoc manner and the gate way nodes of the internet of things platform. The proposed protocol for routing is develop in the MATLAB and simulated in it to manifest the proficiency of the developed protocol on the terms of the energy consumption, packet deliver rate, percentage of losses incurred and running time.

Keywords

Wireless-Sensors Internet of things unique key Generation Bezier Curve Authentication Mid-Square Hash

Full Article PDF
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here