GRD Journals- Global Research and Development Journal for Engineering | Volume 4 | Issue 11 | October 2019 ISSN: 2455-5703
A Comprehensive Review on Location Aided Routing Protocols in Computer Networks Dr. N. Revathy Professor PG and Research Department of Computer Applications Hindusthan College of Arts and Science, Coimbatore, India
Dr. T. Guhan Assistant Professor (Sr.Grade) Department of Computer Science and Engineering Sri Ramakrishna Engineering College, Coimbatore, India
C. T. Arunima II MCA PG and Research Department of Computer Applications Hindusthan College of Arts and Science, Coimbatore, India
Megha Manoj II MCA PG and Research Department of Computer Applications Hindusthan College of Arts and Science, Coimbatore, India
Abstract This work uses location information which is obtained using the global positioning system which consists of route request, expected zone and request zone to improve the accuracy and the performance of the networks. An algorithm is used to encrypt and decrypt the content. This system is designed for the routing the data from a server to the requesting mobile devices such that the data is promptly delivered. The system will be designed with the security algorithm RSA. Keywords- Location-Aided Routing (LAR) protocols, RSA, Encryption, Decryption, Route Request, Expected zone, Request Zone
I. INTRODUCTION This project suggests an approach to utilize location information (for instance, obtained using the global positioning system) to improve performance of routing protocols for ad hoc networks. By using location information, the proposed Location-Aided Routing (LAR) protocols limit the search for a new route to a smaller “request zone” of the ad hoc network. This results in a significant reduction in the number of routing messages. We present two algorithms to determine the request zone, and also suggest potential optimizations to our algorithms. To provide a secure routing and data transfer between the nodes using location aided routing protocol. Source sends the encrypted data packet to the destination through the route discovered. Destination decrypts the data packet received from the source and sends the acknowledgement.
II. EXISTING SYSTEM The existing system implements the routing algorithm and sends the data through the captured route. It provides connection oriented service for the organization to send and receive the data on network. The data is sent without providing any security options with them. It is easy for the intruders to break the data. Simple encryption algorithms are used which are easy for the intruders to break. A.
Drawbacks The receiver may never know if the document he received has been tampered with. The user may not know if he received the document from the person who claims to have sent it. In existing system no security measures have been incorporated. So it is possible for the intruders to hack the data being sent. No route maintenance in the existing system. Each time the data to be sent the route is to be discovered.
B. Proposed System The proposed system is designed for the routing the data from a server to the requesting mobile devices such that the data is promptly delivered. The system will be designed with the security algorithm RSA. The route is discovered and the route is maintained for the future transfer of data. The shortest path is maintained and the data in the future is sent through the same path. C. Advantages of Proposed System The proposed system, “Location aided routing for mobile ad hoc network” is designed such a way that it provides the security options for the data to be sent. The system uses RSA algorithm. This algorithm is based on very large prime numbers which is very hard to break by the intruders.
All rights reserved by www.grdjournals.com
18