PERFORMANCE EVALUATION OF AOMDV AND IAOMDV UNDER PRETTY GOOD PRIVACY MODEL

The routing protocols are used to boost or maximize network throughput, to maximize network lifetime, to maximize energy efficiency and to minimize delays. The network throughput is measured by packet delivery ratio and energy contribution is measured by routing overhead which is number or size of routing control packets. When the security model is applied, routing protocols behave differently. So, the effect of the overheads has to be analyzed in the current research work. The P.G.P. technique with AOMDV routing protocol will be applied to make it IAOMDV (Improved AOMDV) with the help of LOAD BALANCING. This strategy will make on demand protocols more secure. This study will useful for the protocols by making them more robust against attacks and also to standardize parameters for security in routing protocols. PKI and PGP play the vital role in terms of the safety measures. It is ease to maintain the safety of an established or fixed network but for an ambulatory (mobile) and dynamically changeable network it is highly difficult as malicious node can easily attack. Thus in the current research work, the safety measure with Public key infrastructures and its numerous types that can help to handle the security in the MANET will be focused by avoiding crucial Black Hole Attack and DDOS( Distributed Denial of Service) Attack by reducing the overheads.

[1]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[2]  Shi Lei,et al.  Research on Trust Model of PKI , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

[3]  Xing-hui Wu,et al.  Research of the Database Encryption Technique Based on Hybrid Cryptography , 2010, 2010 International Symposium on Computational Intelligence and Design.

[4]  Wai-Choong Wong,et al.  A robust routing protocol for wireless mobile ad hoc networks , 2002, The 8th International Conference on Communication Systems, 2002. ICCS 2002..

[5]  K. R. Anupama,et al.  A multicast protocol for mobile adhoc networks , 2002, 2002 IEEE International Conference on Personal Wireless Communications.

[6]  Azzedine Boukerche,et al.  A simulation based study of on-demand routing protocols for ad hoc wireless networks , 2001, Proceedings. 34th Annual Simulation Symposium.

[7]  S. Adibi,et al.  Security Routing in MANETs - A Comparative Study , 2006, 2006 IEEE International Conference on Electro/Information Technology.

[8]  Jiang Haowei,et al.  Research in P2P-PKI trust model , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[9]  Vijay Varadharajan,et al.  Designing secure wireless mobile ad hoc networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[10]  Gopinath Ganapathy,et al.  Performance Comparison of Mobile Ad-hoc Network Routing Protocol , 2007 .

[11]  Mahesh K. Marina,et al.  On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[12]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[13]  Svein Johan Knapskog New Cryptographic Primitives (Plenary Lecture) , 2008 .

[14]  Byoungcheon Lee,et al.  Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography , 2010, 2010 International Conference on Availability, Reliability and Security.

[15]  Anuj K. Gupta,et al.  Secure Routing Techniques for MANETs , 2009 .

[16]  J. Quamar,et al.  A hybrid cryptography model for managing security in dynamic topology of MANET , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[17]  A.A. Pirzada,et al.  Trustworthy routing with the AODV protocol , 2004, 2004 International Networking and Communication Conference.

[18]  T R Mahesh,et al.  Design of new security algorithm: Using hybrid Cryptography architecture , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[19]  M. Markovic Data Protection Techniques, Cryptographic Protocols and PKI Systems in Modern Computer Networks , 2007, 2007 14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services.

[20]  Fuwen Pang,et al.  Improved PKI Solution for Mobile Ad Hoc Networks , 2010, 2010 International Conference on Multimedia Technology.

[21]  Hiroyuki Seki,et al.  Certificate Chain Discovery in Web of Trust for Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).