User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 18
 Downloands 6
A Hybrid Cryptography Approach To Safeguard The Privacy In A Manet
2022
Journal:  
İlköğretim Online
Author:  
Abstract:

In a mobile ad hoc network (MANET), groups of mobile devices band together for a limited time to create a network that does not require any permanent infrastructure. Its use stems from the fact that it requires nothing in the way of upkeep or organization and can be moved from place to place thanks to wireless connections. The first is a decrease in network performance, and the second is a lack of security. Multiple attacks have hampered the efficiency of mobile ad hoc systems. For the sake of this article, we have limited our attention to network-layer active attacks. As a reactive routing system for ad hoc networks, Ad Hoc On-Demand Vector Routing protocol simply keeps routes between communicating nodes. AODV ensures that there are no routing loops even if a connection fails. Safe Ad-Hoc On-Demand Routers (SAODV) provides a trustworthy routing system for mobile ad-hoc networks. Our approach employs SAODV protocol and the Hybrid Cryptography Technique (DES, RSA Algorithms) on SAODV to boost performance and ensure confidentiality in MANET. This study provides a simulation-based comparison of the MANET routing protocols AODV and SAODV across a range of performance, energy, and packet-delivery metrics. The NS2 network simulation environment is used to realize the suggested cryptographic routing algorithm. As a result of implementing our proposed strategy, we see reduced energy consumption, a high packet delivery ratio, and a high throughput.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles












İlköğretim Online

Field :   Eğitim Bilimleri

Journal Type :   Ulusal

Metrics
Article : 6.985
Cite : 19.864
2023 Impact : 0.025
İlköğretim Online