A Simulation And Analysis Of Secured S-DSR Protocol In Mobile Ad Hoc Networks

International Journal of Computer & Organization Trends (IJCOT)          
© 2013 by IJCOT Journal
Volume-3 Issue-5                           
Year of Publication :  2013
Authors :  Sesha Bhargavi Velagaleti , Dr.M.Seetha , Dr.S.Viswanadha Raju


Sesha Bhargavi Velagaleti , Dr.M.Seetha , Dr.S.Viswanadha Raju . "A Simulation And Analysis Of Secured S-DSR Protocol In Mobile Ad Hoc Networks" . International Journal of Computer & organization Trends (IJCOT ), V3(5):32-35 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.


A MANET is a special kind of wireless network,which can be treated as a collection of mobile nodes co-existing with eachother without the need of any fixed infrastructure.Because of the limited physical security,ad hoc topology,battery-based operation, and lack of a centralized coordinator,it is more prone toattacks than awired network .Our main aim isto provide secure datatransmission between the source and destination nodes. The simulation is carried out for different number ofmobile nodes using network simulator with the help of 1000 mobile nodes. We have compared this S-DSR modelwith the existing models such as DSR and AODV. This model has shown the better results in terms ofpacket delivery, packet drop, and delay even in the presence of more no.of malicious nodes.


[1]Rachit Jain1, LaxmiShrivastava “Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models” International Journal of Advanced Science and Technology Vol. 32, July, 2011
[2] hananjayBisen at el. “Effect of Pause Time on DSR, AODV and DYMO Routing Protocols in MANET” Manuscript received November 20, 2009.
[3] Monika at el. “Comparative Study of AODV, DSDV and DSR Routing Protocols in Vehicular Network Using EstiNet Simulator” International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012
[4] M.L Sharma at el.“ Performance Evaluation of MANET Routing Protocols under CBR and FTP traffic classes” Int. J. Comp. Tech. Appl., Vol 2 (3), 392-400 ISSN: 2229-6093
[5]Liang Qin Thomas Kunz “Increasing Packet Delivery Ratio in DSR by Link Prediction” Proceedings of the 36th Hawaii International Conference on System Sciences - 2003
[6]International Journal of Advanced Research in Computer Science and Software EngineeringResearch Paper “A Comparative Study of AODV & DSR Routing Protocols in Mobile Ad-Hoc Networks “Anit Kumar* M.Tech., Department of Computer Science and Applications, KurukshetraUniversity, Kurukshetra, Haryana, India.
[7] TCP over Ad Hoc Networks : NS-2 Simulation Analysis by Ren Mao, Haobing Wang, Li Li, Fei Ye
[8] SIMULATION AND COMPARISION OF AODV AND DSR ROUITNG PROTOOCLS IN MANETS byvivekkumar under the supervision of M.sumitmiglani.
[9] NEW SECURITY ALGORITHM FOR MOBILE ADHOC NETWORKS USING ZONAL ROUTING PROTOCOL by G.Varaprasad, S. Dhanalakshmi,, M. Rajaram ,Department of Computer Science and Engineering, B.M.S. College of Engineering, Bangalore, India
[10] Y.Zhang, W. Lee, and Y.-A. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks”, ACM Wireless Networks, Vol. 9, pp. 545 – 556(2003).
[11]Y. C. Hu and A. Perrig, “A Survey of Secure Wireless Adhoc Routing,” IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp. 28-39(2004).
[12]J. Li, J. Jannotti, Douglas S. J. D. Couto, David. R. Karger, and R. Morris, “A Scalable Location Service for Geographic Adhoc Routing”, In Proceedings of International Conference on Mobile Computing and Networking, pp. 120-130(2002).
[13] B. Karp and H. Kung, “Greedy Perimeter Stateless Routing for Wireless Networks”, InProceedings of International Conference on Mobile Computing and Networking, pp. 243-254(2003).
[14]Y. A. Huang and W. Lee, “Attack Analysis and Detection for Adhoc Routing Protocols,”In Proceedings of International Symposium on Recent Advances in Intrusion Detection, pp. 125-145(2004). hekhawati Engineering College, Jhunjhunu, Rajasthan.


MANET, Network Simulator, DSR,AODV.