Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet
نویسندگان
چکیده
A Mobile Ad-Hoc Network(MANET) is a structure-less network where the mobile nodes randomly moved in any direction within the transmission range of the network. Due to this mobility, wide range of intrusion occurs in MANET. Therefore, Intrusion Detection Systems (IDS) are significant in MANETs to identify the malicious behavior. In order to improve the secured data communication an efficient Quantum Phase Shift Energy Conserved Data Security (QPSEC-DS) technique is introduced. The Quantum Phase Shift (QPS) technique is used for ensuring the security during the data transmission from sender to receiver in MANET. Initially, the quantum based approach is used to encrypt the information using QPS at the sender through secret key distribution. The receiver side also performs the same QPS, and then the encrypted bit is received successfully. This in turns attains the secured packet transmission without any malicious node in the MANET. Based on the phase shifting, the energy conservation between the sender and receiver is measured for transmitting the data packet using QPSEC-DS technique. Also, the enhanced Dynamic Source Routing (DSR) protocol is applied in QPSEC-DS technique is implemented to improve the energy management and secured data communication between the source and destination in an efficient manner. The QPSEC-DS technique conducts the simulations work on parameters including packet delivery ratio, energy consumption, communication overhead and end to end delay.
منابع مشابه
Quantum Mechanics-Molecular Mechanics Model Study of some Antibiotics and Vitamins in Gas Phases: Investigation of Energy and NMR Chemical Shift
The combination of Quantum Mechanics (QM) and Molecular Mechanics (MM) methods hasbecome alternative tool for many applications that pure QM and MM could not be suitable.The QM/MM method has been used for different type of problems, for example: structuralbiology, surface phenomena, and liquid phase. In this paper we have performed these methods forsome antibiotics and vitamins and then we comp...
متن کاملSecured and Intelligent Multipath Routing Approach using AOMDV in Manet
There are two type of communication network used for communication purpose first one is Traditional wireless network and second is mobile Ad hoc network . Mobile Ad hoc network is better option than Traditional Ad hoc network due to its independent nodes and no central administration required. In MANET, sensor nodes are battery operated because it is a limited resource therefore it requires att...
متن کاملSecured Consistent Network for Coping up with Fabrication Attack in Manet
Recent advances in wireless communication along with peer –peer paradigm have led to increasing interest in P2P MANET. In mobile ad-hoc networks, mobile host move freely thereby disconnections occur frequently and result in network partition, which decreases data availability. Consequently, data replication improves data availability which maintains the consistency in network. MANETs must have ...
متن کاملQuantum Chemical Modeling of 1-(1, 3-Benzothiazol-2-yl)-3-(thiophene-5-carbonyl) thiourea: Molecular structure, NMR, FMO, MEP and NBO analysis based on DFT calculations
In the present work, the quantum theoretical calculations of the molecular structure of the 1-(1, 3-Benzothiazol-2-yl)-3-(thiophene-5-carbonyl) thiourea has been predicted and are evaluated using Density Functional Theory (DFT) in gas phase. The geometry of the title compound was optimized by B3LYP/6-311+G and B3LYP/6-311+G* methods and the experimental geometrical parameters of the title compo...
متن کاملSecured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures
The emerging need for mobile ad hoc networks and secured data transmission phase is of crucial importance depending upon the environments like military. In this paper, a new way to improve the reliability of message transmission is presented. In the open collaborative MANET environment, any node can maliciously or selfishly disrupt and deny communication of other nodes. Dynamic changing topolog...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCNIS
دوره 9 شماره
صفحات -
تاریخ انتشار 2017