The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Now day while data transmission, security is one of the major issues for data transmission over wireless networks. Existing system utilizes security algorithm for secured data transmission over networks, but in proposed system, security is achieved without any use of security algorithm. Existing work on secure data transmission includes the designs of many security algorithms and system infrastructures. Proposed System will secure data transmission to dynamically route packets between each source and destination. For data transmission, different protocols i.e. Ad-hoc On-Demand Distance Vector (AODV) and Destination Sequence Distance Vector (DSDV) will be utilized which will maintain the routing table of the network. This system will be utilizing 'mobility cluster head' instead of security algorithms for data transmission over wireless networks. 'Mobility Cluster Head' will contain the information of each node within a wireless network and if any unauthorized node will try to hack the information then 'Mobility Cluster Head' or Global Inspector (GI) will try to secure the configured network from the unidentified attackers. Also, we will try to implement different network that uses AODV, and DSDV for wireless network, finally we are conclude which protocol is efficient for secured data transmission without any use of security algorithm.
User
Notifications
Font Size