Académique Documents
Professionnel Documents
Culture Documents
ISSN: 2455-5703
Abstract
This work uses location information which is obtained using the global positioning system which consists of route request, expected
zone and request zone to improve the accuracy and the performance of the networks. An algorithm is used to encrypt and decrypt
the content. This system is designed for the routing the data from a server to the requesting mobile devices such that the data is
promptly delivered. The system will be designed with the security algorithm RSA.
Keywords- Location-Aided Routing (LAR) protocols, RSA, Encryption, Decryption, Route Request, Expected zone,
Request Zone
I. INTRODUCTION
This project suggests an approach to utilize location information (for instance, obtained using the global positioning system) to
improve performance of routing protocols for ad hoc networks. By using location information, the proposed Location-Aided
Routing (LAR) protocols limit the search for a new route to a smaller “request zone” of the ad hoc network. This results in a
significant reduction in the number of routing messages. We present two algorithms to determine the request zone, and also suggest
potential optimizations to our algorithms. To provide a secure routing and data transfer between the nodes using location aided
routing protocol. Source sends the encrypted data packet to the destination through the route discovered. Destination decrypts the
data packet received from the source and sends the acknowledgement.
A. Drawbacks
The receiver may never know if the document he received has been tampered with.
The user may not know if he received the document from the person who claims to have sent it.
In existing system no security measures have been incorporated. So it is possible for the intruders to hack the data being sent.
No route maintenance in the existing system. Each time the data to be sent the route is to be discovered.
B. Proposed System
The proposed system is designed for the routing the data from a server to the requesting mobile devices such that the data is
promptly delivered. The system will be designed with the security algorithm RSA. The route is discovered and the route is
maintained for the future transfer of data. The shortest path is maintained and the data in the future is sent through the same path.
This system provides an efficient routing algorithm for the mobile devices.
The system also provides route maintenance options. This module maintains the route that is captured during route
establishment phase. The same route can be used for the successive data to be sent.
The system is to be developed using java swings for the GUI interface. Hence the interface to be used will be a user friendly.
The system will be handling the data such a way that if the loop forms in the route the data is discarded. Hence provides an
efficient way of routing data and a prompt delivery of the data to the recipient.
III. MODULES
A. Route Discovery
Location Aided Routing (LAR) protocol is one which utilizes the location information of a mobile host to limit the search to a
smaller region. It involves mainly two mechanisms:
Route Discovery
Route Maintenance
Two concepts of Route Discovery.
Request zone
Expected zone
1) Data Security
Source sends the encrypted data packet to the destination through the route discovered.
Destination decrypts the data packet received from the source and sends the acknowledgement. It involves two steps:
Message Encryption
Message Decryption
2) Data Transfer
Broadcast the Route Request to its neighbors.
B. Route Maintenance
Maintaining Routes
Data Transfer
1) Route Disconnection
If the user wants to send data:
Get the Destination identifier and the encrypted data to be transferred.
Initialize the buffer with the encrypted data to be transferred.
Setup a Request Zone.
Build a Route Request packet having the information about the source and the Destination identifiers, and the Request Zone
information.
Broadcast the Route Request to its neighbors.
Setup a timer for receiving Route Reply
If the node receives a packet
1) Find the type of the packet received.
2) Depending on the type of packet received do one of the following processes.
Process Route Request
Process Route Reply
Process Data Packet
Process Acknowledgement
Process Route Disconnect
Process Route Disconnect reply
V. EXPERIMENTAL RESULTS
Input design is a process of connecting the user-originated inputs into a computer used format. The goal of the input design is to
make the data entry logical and free from errors. Errors in the input database controlled by input design. This application is being
developed in a user-friendly manner.
The output from the system is either by screen or by hard copies. Output design aims at communicating the results of the
processing to the users. The reports are generated to suit the needs of the users. The reports have to be generated with appropriate
levels.
VI. CONCLUSION
The results of the location aided routing indicate that the usage information reduces the overhead as compared to other algorithm.
In addition it provides a secure data transmission over a network. The software is programmed to transmit file through LAN to a
single computer at a time. The software can be enhanced to transmit file to more than one computer at a time, that is, multipoint
communication. Our system when extended could be used by business transactions. In future, militaries personal and banks may
extend our project for secure transmission of messages and electronic banking.
REFERENCES
[1] I.F. Akyildiz, S.M. Joseph and Yi-Bing Lin, Movement-based location update and selective paging for PCS networks, IEEE/ACM Transactions on
Networking 4 (1996) 94–104.
[2] C. Alaettinoglu, K. Dussa-Zieger, I. Matta and A.U. Shankar, MaRS user’s manual – version 1.0, Technical Report TR 91-80, The University of Maryland
(June 1991).
[3] S. Basagni, I. Chlamtac, V.R. Syrotiuk and B.A. Woodward, A distance routing effect algorithm for mobility (DREAM), in: Proc. Of ACM/IEEE MOBICOM
’98 (1998).
[4] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu and J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: Proc.
of MOBICOM ’98 (1998).
[5] S. Corson, S. Batsell and J. Macker, Architectural considerations for mobile mesh networking (Internet draft RFC, version 2), in: Mobile Ad-hoc Network
(MANET) Working Group, IETF (1996).
[6] S. Corson and A. Ephremides, A distributed routing algorithm for mobile wireless networks, Wireless Networks (1995) 61–81.
[7] S. Corson and J. Macker, Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations (Internet-draft), in:
Mobile Ad-hoc Network (MANET) Working Group, IETF (1998).
[8] S.R. Das, R. Castaneda, J. Yan and R. Sengupta, Comparative performance evaluation of routing protocols