PERFORMANCE OPTIMIZATION OF WIRELESS ADHOC NETWORKS WITH AUTHENTICATION
PDF
PDF

How to Cite

Smys, S., and Jennifer S. Raj. 2019. “PERFORMANCE OPTIMIZATION OF WIRELESS ADHOC NETWORKS WITH AUTHENTICATION”. Journal of Ubiquitous Computing and Communication Technologies 1 (2): 64-75. https://doi.org/10.36548/jucct.2019.2.001.

Keywords

— Wireless Adhoc network
— Authentication
— Cluster based routing
— Throughput
— Energy Consumption and Security in Conveyance
Published: 31-12-2019

Abstract

Adhoc networks as the name suggests is framed for a specialized reason using the volunteering devices available near the source to destination, utilizing the devices in between the source and the destination as the relaying nodes. Several methods were framed to optimize the performance of the wireless adhoc network to retain the energy level of the devices in turn to extend the lifetime of the devices. The cluster based routing seemed to be very promising in terms of energy efficiency, throughput and delay. These cluster based adhoc networks are very much exposed to security breaches as they are not aided with sufficient security. The conveyance taking place between the head of the cluster to base station is often affected by the many attacks from different sources by altering the information or hacking the information. So the paper puts forward the verification code for every data transmitted from the head of the cluster to the base station. The proposed method is validated using the network simulator-2 in the terms of throughput, energy consumption and security in data conveyance and compared with the prevailing methods that bare authentication.

References

  1. Raj, Jennifer S., S. Smys, and G. Josemin Bala. "Performance improvement in manets: a cross layer approach via TCP." International Journal of Recent Trends in Engineering 2, no. 1 (2009).
  2. Harikumar, R., and Jennifer S. Raj. "Ad hoc node connectivity improvement analysis–Why not through mesh clients?." Computers & Electrical Engineering 40, no. 2 (2014): 473-483.
  3. Ramesh, S., and S. Smys. "Performance analysis of heuristic clustered (HC) architecture in wireless networks." In 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1-4. IEEE, 2017.
  4. Smys, S. "ENERGY-AWARE SECURITY ROUTING PROTOCOL FOR WSN IN BIG-DATA APPLICATIONS." Journal of ISMAC 1, no. 01 (2019): 38-55.
  5. Raj, Jennifer S., and A. Anto Prem Kumar. "ENERGY EFFICIENT LOCALIZATION AND ROUTING STRATEGY FOR CLUSTER BASED SENSOR NETWORKS."
  6. Smys, S. "DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 33-44.
  7. Duraipandian, M. "PERFORMANCE EVALUATION OF ROUTING ALGORITHM FOR MANET BASED ON THE MACHINE LEARNING TECHNIQUES." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 01 (2019): 25-38.
  8. Rahimunnisa, K. "HYBRIDIZED GENETIC-SIMULATED ANNEALING ALGORITHM FOR PERFORMANCE OPTIMIZATION IN WIRELESS ADHOC NETWORK." Journal of Soft Computing Paradigm (JSCP) 1, no. 01 (2019): 1-13.
  9. Shakya, Subarna. "AN EFFICIENT SECURITY FRAMEWORK FOR DATA MIGRATION IN A CLOUD COMPUTING ENVIRONMENT." Journal of Artificial Intelligence 1, no. 01 (2019): 45-53.
  10. Bashar, Abul. "SECURE AND COST EFFICIENT IMPLEMENTATION OF THE MOBILE COMPUTING USING OFFLOADING TECHNIQUE." Journal of Information Technology 1, no. 01 (2019): 48-57.
  11. Smys, S., and G. Josemin Bala. "Stab-WIN: Self organized, topology control ability backbone node in wireless networks." Wireless Personal Communications 63, no. 3 (2012): 529-548.
  12. Praveena, A., and S. Smys. "Efficient cryptographic approach for data security in wireless sensor networks using MES VU." In 2016 10th international conference on intelligent systems and control (ISCO), pp. 1-6. IEEE, 2016.
  13. Sridhar, S., and S. Smys. "A hybrid multilevel authentication scheme for private cloud environment." In 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1-5. IEEE, 2016.
  14. Dordaie, Negar, and Nima Jafari Navimipour. "A hybrid particle swarm optimization and hill climbing algorithm for task scheduling in the cloud environments." ICT Express 4, no. 4 (2018): 199-202.
  15. Joseph, S. Iwin Thanakumar. "SURVEY OF DATA MINING ALGORITHM’S FOR INTELLIGENT COMPUTING SYSTEM." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 01 (2019): 14-24.