SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 720
FLIO: FAILURE LINKS INTO OPTIMISTIC USING DIFFIE HELLMEN
KEY ALGORITHM
J. Antony Daniel Rex1
1
M. Phil., Research scholar, PG and Research Department of Computer Science, Government Arts College
(Autonomous), Salem (Tamil Nadu), India
Abstract
In Mobile ad-hoc network (MANET) a node may transfer the data to the destination with the help of the cooperative node. A
change in network topology may degrade the path of current data transfer, and then it causes the link failure. In this kind of
routing, security and key organization are important and complex problem. This research work tries to give a solution for link
failure by using Distributed Time Sequence Routing protocol (DTSR), the DTSR is used to locate the correct relay node and sink
node for data transmission.
Keywords: DSDV, Key Agreement, Link Failure, MANET, etc…
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
In mobile ad-hoc network, there is no need of any
infrastructure network, Node can be move anywhere. So that
MANET can be defined as an independent mobile node that
communicates over wireless links without any
infrastructure. Here every node at as a router it can transfer
the data to source to distention Router only fixes how to
forward packets to node. There are various routing protocols
are been used to MANET .if the path node have stable link
then the data will reach the distention, at the time of sending
data if the node topology has been change, then link failure
will accrue in MANET. The communication of each node
has to known each other then only the failure will not
accrue, for the intend they need key agreement for each
node, it also give the vulnerable to the node and secure to
the packets.
2. KEY AGREEMENT
In the proposed system Distributed Time Sequence Routing
protocol (DTSR) is used to send the data efficiently and
quickly on the network. DTSR protocol is used to transfer
the data without any modification. Availability parameters
are connectivity and functionality in the network
organization layer. Loss is the fraction of packets lost in
transit from sender to target during a specific time interval,
expressed in percentages. The Proposed system aim is to
improve the network throughput, Network delivery ratio,
and availability and data loss. Consequently, the Diffie-
Hellman algorithm is used with a form of authentication
which uses the certificates to ensure that symmetric keys are
established between nodes. The steering metrics are
evaluated in dissimilar literatures to indicate the significance
and measuring purpose of frequent routing protocols. A
cryptographic key exchange method was developed by
Whitfield Diffie and Martin Hellman in 1976. This method
is called as “Diffie-Hellman-Merkle” method. Key
distribution is an important aspect of conventional algorithm
and the entire safety is dependent on the distribution of key
using secured channel
Key exchange algorithm is:
Step1: GLOBAL PUBLIC ELEMENTS
Select any prime no.: ‟q‟ Calculate the Primitive
root of q:‟a‟ such that a<q.
Step2: ASYMMETRIC KEY GENERATION BY USER
„A‟
Select a Random number as private key XA where
XA<q. calculate the public key
YA where YA = aX
A mod q.
Step3: KEY GENERATION BY USER „B‟
Choose an arbitrary number as the private key X B
where XB< q Calculate the public Key Y B where
Y B = a X
B mod q.
Step4: Exchange the values of public key between A and
B
Step5: SYMMETRIC KEY (K) GENERATION BY
USER 'A‟
K=YB
X
A mod q.
Step 6: SYMMETRIC KEY (K) GENERATION BY USER
'B'
K= YA
X
B mod q.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 721
3. EXPERIMENTAL RESULT
3.1 Packet Delivery Ratio
Packet Delivery Ratio (PDR) is shown figure 1 and it has
been calculated by dividing the number of packets received
by the destination through the number of packets originated
by the source.
PDR = Total number of data delivered
Total numbers of sending data
Fig 1: Proposed System
4. CONCLUSIONS
Most of the Link failure will be occurs in MANET by
topology change, here this work Present the key distribution
scheme, based on intrusion detection method for using a
data transmission from source to destination on the network.
It based high level security and more energy efficient data
transmission on their network. Transfer the data form source
to destinations within the node coverage area using Diffe
Hellman key algorithm. In this algorithm is used to avoid
the link failure and it also provide the secure to the packet
transfer.
This work has used efficient Symmetric cryptographic
primitives, called key authentication protocol with shared
secret keys between communicating nodes on the ad-hoc
network. It prevents Denial-of-Service attacks and
modification of hop count attacks by malicious node.
In future, work may be conducted to improve the
performance metrics of packet delivery ratio and control
overhead of Secured DSDV by using efficient multi-hop
route cache techniques.
REFERENCES
[1] Key Distributed Cryptography using Key Algorithm
in MANET ISSN (Print) : 2319 – 2526, Volume-2,
Issue-5, 2013, Rajesh Kumar Dangi, Rachna Singh
Thakur
[2] An Algorithm for Improvement of Link Failure in
Mobile Ad-Hoc Network Vibhor Kumar Goal* and
Rishabh Shrivastava** and Vivek Malik*
International Journal for Science and Emerging ISSN
No. (Online):2250-3641Technologieswith Latest
Trends” 10(1): 15-18 (2013)
[3] LSR Protocol Based On Nodes Potentiality in Trust
and Residual Energy for ADHOC NETWORKs,
Shaik Sahil Babu #1 , Arnab Raha #2 , M.K. Naskar
#3 International Journal of Network Security & Its
Applications (IJNSA), Vol.4, No.2, March 2012
[4] “A survey on power aware routing protocols in
mobile adhoc networks” by Dr.D.Vasumathi,
N.Sainath, U.Moulali, B.Koteshwara Rao July-
august 2012
[5] Identifying Trusted Routing Path in ADHOC
NETWORKs through TARF, Journal of Advanced
Technology in Engineering, Vol. 1, No. 1,
December 2012. pp.37-41.
[6] Design and implementation of a Trust-aware routing
protocol for large ADHOC NETWORKs, Theodore
Zahariadis11 , Helen Leligou, Panagiotis Karkazis 5
, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.3, July 2010
[7] Stallings, W., “Cryptography and Network security:
Principles and Practices,” Fourth Edition, Pearson
Education, 2006.
[8] A Key Management Scheme for Wireless Sensor
Networks Using Deployment Knowledge, published
in Proceedings of the IEEE INFOCOM, March 7-11,
2004, Hong Kong. Pages 586-597.
[9] Chung and U. Roedig. “Poster Abstract: DHB-KEY
– A Diffie-Hellman Key Distribution Protocol for
Wireless SensorNetworks”, Adjunct Proceedings of
the 5th IEEE EuropeanWorkshop on Wireless Sensor
Networks (EWSN2008), Bologna,Italy, January
2008.
[10] DHB-KEY: An efficient key distribution scheme
forwireless sensor networks, Infolab21, Lancaster
Univ., Lancaster Mobile Ad Hoc and Sensor
Systems, 2008. MASS 2008. 5th IEEE International
Conference on
BIOGRAPHIE
J. Antony Daniel Rex, M. Phil., Research
Scholar, Govt. Arts College, Salem –
636007. I have attended three National level
Workshops, One National level Seminar and
Published one Paper titled as “Routing
Protocols in MANET” in National level
Conference.

Más contenido relacionado

Más de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Más de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Último (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

Flio failure links into optimistic using diffie hellmen key algorithm

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 720 FLIO: FAILURE LINKS INTO OPTIMISTIC USING DIFFIE HELLMEN KEY ALGORITHM J. Antony Daniel Rex1 1 M. Phil., Research scholar, PG and Research Department of Computer Science, Government Arts College (Autonomous), Salem (Tamil Nadu), India Abstract In Mobile ad-hoc network (MANET) a node may transfer the data to the destination with the help of the cooperative node. A change in network topology may degrade the path of current data transfer, and then it causes the link failure. In this kind of routing, security and key organization are important and complex problem. This research work tries to give a solution for link failure by using Distributed Time Sequence Routing protocol (DTSR), the DTSR is used to locate the correct relay node and sink node for data transmission. Keywords: DSDV, Key Agreement, Link Failure, MANET, etc… --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION In mobile ad-hoc network, there is no need of any infrastructure network, Node can be move anywhere. So that MANET can be defined as an independent mobile node that communicates over wireless links without any infrastructure. Here every node at as a router it can transfer the data to source to distention Router only fixes how to forward packets to node. There are various routing protocols are been used to MANET .if the path node have stable link then the data will reach the distention, at the time of sending data if the node topology has been change, then link failure will accrue in MANET. The communication of each node has to known each other then only the failure will not accrue, for the intend they need key agreement for each node, it also give the vulnerable to the node and secure to the packets. 2. KEY AGREEMENT In the proposed system Distributed Time Sequence Routing protocol (DTSR) is used to send the data efficiently and quickly on the network. DTSR protocol is used to transfer the data without any modification. Availability parameters are connectivity and functionality in the network organization layer. Loss is the fraction of packets lost in transit from sender to target during a specific time interval, expressed in percentages. The Proposed system aim is to improve the network throughput, Network delivery ratio, and availability and data loss. Consequently, the Diffie- Hellman algorithm is used with a form of authentication which uses the certificates to ensure that symmetric keys are established between nodes. The steering metrics are evaluated in dissimilar literatures to indicate the significance and measuring purpose of frequent routing protocols. A cryptographic key exchange method was developed by Whitfield Diffie and Martin Hellman in 1976. This method is called as “Diffie-Hellman-Merkle” method. Key distribution is an important aspect of conventional algorithm and the entire safety is dependent on the distribution of key using secured channel Key exchange algorithm is: Step1: GLOBAL PUBLIC ELEMENTS Select any prime no.: ‟q‟ Calculate the Primitive root of q:‟a‟ such that a<q. Step2: ASYMMETRIC KEY GENERATION BY USER „A‟ Select a Random number as private key XA where XA<q. calculate the public key YA where YA = aX A mod q. Step3: KEY GENERATION BY USER „B‟ Choose an arbitrary number as the private key X B where XB< q Calculate the public Key Y B where Y B = a X B mod q. Step4: Exchange the values of public key between A and B Step5: SYMMETRIC KEY (K) GENERATION BY USER 'A‟ K=YB X A mod q. Step 6: SYMMETRIC KEY (K) GENERATION BY USER 'B' K= YA X B mod q.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 721 3. EXPERIMENTAL RESULT 3.1 Packet Delivery Ratio Packet Delivery Ratio (PDR) is shown figure 1 and it has been calculated by dividing the number of packets received by the destination through the number of packets originated by the source. PDR = Total number of data delivered Total numbers of sending data Fig 1: Proposed System 4. CONCLUSIONS Most of the Link failure will be occurs in MANET by topology change, here this work Present the key distribution scheme, based on intrusion detection method for using a data transmission from source to destination on the network. It based high level security and more energy efficient data transmission on their network. Transfer the data form source to destinations within the node coverage area using Diffe Hellman key algorithm. In this algorithm is used to avoid the link failure and it also provide the secure to the packet transfer. This work has used efficient Symmetric cryptographic primitives, called key authentication protocol with shared secret keys between communicating nodes on the ad-hoc network. It prevents Denial-of-Service attacks and modification of hop count attacks by malicious node. In future, work may be conducted to improve the performance metrics of packet delivery ratio and control overhead of Secured DSDV by using efficient multi-hop route cache techniques. REFERENCES [1] Key Distributed Cryptography using Key Algorithm in MANET ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013, Rajesh Kumar Dangi, Rachna Singh Thakur [2] An Algorithm for Improvement of Link Failure in Mobile Ad-Hoc Network Vibhor Kumar Goal* and Rishabh Shrivastava** and Vivek Malik* International Journal for Science and Emerging ISSN No. (Online):2250-3641Technologieswith Latest Trends” 10(1): 15-18 (2013) [3] LSR Protocol Based On Nodes Potentiality in Trust and Residual Energy for ADHOC NETWORKs, Shaik Sahil Babu #1 , Arnab Raha #2 , M.K. Naskar #3 International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012 [4] “A survey on power aware routing protocols in mobile adhoc networks” by Dr.D.Vasumathi, N.Sainath, U.Moulali, B.Koteshwara Rao July- august 2012 [5] Identifying Trusted Routing Path in ADHOC NETWORKs through TARF, Journal of Advanced Technology in Engineering, Vol. 1, No. 1, December 2012. pp.37-41. [6] Design and implementation of a Trust-aware routing protocol for large ADHOC NETWORKs, Theodore Zahariadis11 , Helen Leligou, Panagiotis Karkazis 5 , International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010 [7] Stallings, W., “Cryptography and Network security: Principles and Practices,” Fourth Edition, Pearson Education, 2006. [8] A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, published in Proceedings of the IEEE INFOCOM, March 7-11, 2004, Hong Kong. Pages 586-597. [9] Chung and U. Roedig. “Poster Abstract: DHB-KEY – A Diffie-Hellman Key Distribution Protocol for Wireless SensorNetworks”, Adjunct Proceedings of the 5th IEEE EuropeanWorkshop on Wireless Sensor Networks (EWSN2008), Bologna,Italy, January 2008. [10] DHB-KEY: An efficient key distribution scheme forwireless sensor networks, Infolab21, Lancaster Univ., Lancaster Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on BIOGRAPHIE J. Antony Daniel Rex, M. Phil., Research Scholar, Govt. Arts College, Salem – 636007. I have attended three National level Workshops, One National level Seminar and Published one Paper titled as “Routing Protocols in MANET” in National level Conference.