SECURED AND HIGHLY RELIABLE DATA TRANSFER IN MANET USING POSITION-BASED OPPORTUNISTIC ROUTING PROTOCOL

Similar documents
DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Design a Proposed Algorithm for Reliable Data Delivery for High Dynamic MANET

Performance of Various Routing Protocols in Mobile Ad Hoc Networks-A Survey

Position Based Opportunistic Routing Protocols for Highly Dynamic Mobile Ad- Hoc Networks Rajesh Naidu #1, A.Syam Prasad *2

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility

Energy Aware and Anonymous Location Based Efficient Routing Protocol

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks

SUMMERY, CONCLUSIONS AND FUTURE WORK

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Figure 1: Ad-Hoc routing protocols.

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

Performance Evaluation of MANET through NS2 Simulation

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Power aware Multi-path Routing Protocol for MANETS

Reliable Data Transfer on Dynamic Nodes using Packed Hiding Methods in Ad Hoc Networks A.Umamaheswaran 1, S.Gopikrishnan 2, R.

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

AODV-PA: AODV with Path Accumulation

BGR: Blind Geographic Routing for Sensor Networks

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Performance Evaluation of Various Routing Protocols in MANET

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Beaconing Strategy for Geo-Graphic Routing In Mobile Ad Hoc Networks

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

3. Evaluation of Selected Tree and Mesh based Routing Protocols

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

CS 268: Computer Networking. Taking Advantage of Broadcast

Introduction to Mobile Ad hoc Networks (MANETs)

2013, IJARCSSE All Rights Reserved Page 85

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Mobile Ad-Hoc Networks & Routing Algorithms

Towards Optimal Data Delivery in Highly Mobile Wireless Ad Hoc Networks

Packet Estimation with CBDS Approach to secure MANET

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Routing Protocols in Mobile Ad-Hoc Network

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Computation of Multiple Node Disjoint Paths

Routing Protocols in MANET: Comparative Study

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Making Friends with Broadcast. Administrivia

Routing Protocols in MANETs

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

A Study of Congestion Aware Adaptive Routing Protocols in MANET

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

The Novel HWN on MANET Cellular networks using QoS & QOD

Energy Efficient EE-DSR Protocol for MANET

Estimate the Routing Protocols for Internet of Things

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Geographic Routing in Simulation: GPSR

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Performance Analysis and Enhancement of Routing Protocol in Manet

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

TOWARD RELIABLE DATADELIVERY FOR HIGHLY DYNAMIC MOBILE AD HOC NETWORKS

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Mobile Communications. Ad-hoc and Mesh Networks

Ad Hoc Networks: Introduction

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Transcription:

SECURED AND HIGHLY RELIABLE DATA TRANSFER IN MANET USING POSITION-BASED OPPORTUNISTIC ROUTING PROTOCOL 1 D.Shanmugapriyan, 2 Murugaanandam 1 PG Scholar, Department of Information Technology, SRM University 2 Assistant Professor, Department of Information technology, SRM University 1 d.shanpriyan@gmail.com Abstract: Mobile Ad Hoc Networks (MANETs) is an infrastructure less, multi hop, self-configuring of mobile devices and adaptive wireless network formed by the dynamic gathering of mobile nodes. Because of the portability of versatile node, the topology of a MANET as often as possible progressions and hence brings about the inability of initially on-the-fly information transmission ways. The dynamic properties of MANETs are therefore challenging to protocol design. To accommodate the needs of communications for Mobile Ad hoc Network many routing protocols have been proposed. In this paper, there is problem in delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. The existing ad hoc routing protocols are susceptible to node mobility for the large scale networks. So, in this paper we propose an efficient Position-based Opportunistic Routing (POR) protocol. The design of POR is based on Geographic Routing and Opportunistic Forwarding, which transfers the data packet based on the location of the destination. The concept of in-the-air backup reduces the latency and duplicate relaying caused by local reroute. To increase the level of security we also encrypt the data, before transmission. For encryption of data we use RC4 algorithm which converts original text into cipher text. Using RC4 algorithm encryption time is reduced and it also fastest algorithm compared to other algorithms. Keywords: Geographic routing, stateless property, node mobility, forwarding candidates, data delivery, opportunistic routing, Private key, Stream cipher 1. INTRODUCTION discover the topology and maintain the network Ad-Hoc networks are infrastructure-less networks, connectivity. made up of mobile nodes, which are using their The set of applications for MANETs is ranging neighbors as a means of communication with other from large-scale to small, static networks that are nodes in the network. A source node that needs to constrained by power sources. Moreover the legacy communicate with a destination node uses either a applications that move from traditional infrastructure direct link or a multi hop route to reach the latter. Adhoc networks change their topology, expressed by the environment into the ad hoc context, a great deal of new node connectivity, over time, as the nodes change their services will be generated for the new environment. position in space. [5]Routing schemes of mobile ad-hoc networks can be crudely divided into two groups: topology based routing and position-based routing. Topology based routing uses existing information in the network about links; it includes table driven protocols, such as DSDV and CGSR, on demand protocols, such as AODV, DSR, and more. In this paper we proposed a novel Position-based Opportunistic Routing (POR) protocol in which several forwarding candidates cache the packet that has been received. If the best forwarder does not forward the packet in a particular time slots, then the suboptimal Figure 1: (a) The operation of POR in normal candidates will take turn to forward the packet situation. (b) The operation of POR when the next according to a locally formed order. The effect of node hop fails to receive the packet. mobility on packet delivery can be analyzed and explain the improvement brought about by the A lot of research was done in the past but the most Participation of for-warding candidates. Since there is significant contributions were the PGP (Pretty Good high mobility of the independent mobile nodes the Privacy) and the trust based security but none of the topology of the MANET may change uncertainly and protocols made a decent trade-off between security and rapidly, and because of the network decentralization, performance. To enhance the security in MANETs each node in the MANET will act as a router to many researchers have suggested and implemented new www.ijiser.com 69 Vol 1 Issue 2 FEB 2014/104

improvements to the protocols and some of them have suggested new protocols. 2. RELATED WORKS Josh Broch, David A. Maltz David B. Johnson Yih- Chun Hu, JorjetaJetcheva [1] proposed the results of a derailed packet-level simulation comparing four multihop wireless ad hoc network routing protocols that cover a range of design choices: DSDV,DSR and AODV. The position of a mobile node can be calculated as a function of time, and is used by the radio propagation model to calculate the propagation delay from one node to another and to determine the power level of a received signal at each mobile node. Brad Karp, H. T. Kung [2] discussed The two dominant factors in the scaling of a routing algorithm, the rate of change of the topology and the number of routers in the routing domain. Under GPSR, packets are marked by their originator with their destinations locations. As a result, a forwarding node can make a locally optimal, greedy choice in choosing a packet s next hop. Eric RoznerJayeshSeshadriYogita Ashok Mehta LiliQiu [3] proposed a Simple Opportunistic Adaptive Routing protocol (SOAR) to explicitly support multiple simultaneous flows in wireless mesh networks. SOAR incorporates the following four major components to achieve high throughput and fairness: (i) adaptive forwarding path selection to leverage path diversity while minimizing duplicate transmissions, (ii) priority timer-based forwarding to let only the best forwarding node forward the packet, (iii) local loss recovery to efficiently detect and retransmit lost packets, and (iv) adaptive rate control to determine an appropriate sending rate according to the current network conditions. Dazhi Chen, Jing Deng, Pramod K. Varshney [4] proposed a Contention-based Geographic Forwarding (CGF) technique. Accordingly, CGF mainly consists of the following components: 1) A predefined forwarding area and nodes that reside in the area become next-hop candidate nodes; 2) a distributed contention arbitration and resolution scheme to effectively establish a single next-hop node in the forwarding area; 3) a next-hop node selection criterion so as to attain the desired network performance efficiently; and 4) an effective mechanism to handle voids. A high-level model of CGF is established. Noa Arad, Yuval Shavitt [5] defines that many of the problems of position-based routing originate from the fact that the shape of the network is unknown a priori, and it is dynamically changing due to node mobility. GPSR [15], for example, switches from recovery mode back to greedy mode when the current node is closer to the destination than the node who switched to perimeter mode. However, there is no guarantee that this node, or the next one, will not be another concave node, a local maximum on the perimeter face. 3. POSITION-BASED OPPORTUNISTIC PETAL ROUTING 3.1 Overview The design of POR is based on geographic routing and opportunistic forwarding. The nodes are assumed to be aware of their own location and the positions of their direct neighbors. Neighborhood location information can be exchanged using one-hop beacon or piggyback in the data packets header. While for the position of the destination, we assume that a location registration and lookup service which maps node addresses to locations is available just as in [3]. It could be realized using many kinds of location service. In our scenario, some efficient and reliable way is also available. For example, the location of the destination could be transmitted by low bit rate but long range radios, which can be implemented as periodic beacon, as well as by replies when requested by the source. When a source node wants to transmit a packet, it gets the location of the destination first and then attaches it to the packet header. To deal with such issue, additional check for the destination node is introduced. At each hop, the node that forwards the packet will check its neighbor list to see whether the destination is within its transmission range. If yes, the packet will be directly forwarded to the destination, similar to the destination location prediction scheme described in [4]. By performing such identification check before greedy forwarding based on location information, the effect of the path divergence can be very much alleviated. In conventional opportunistic forwarding, to have a packet received by multiple candidates, either IP broadcast or an integration of routing and MAC protocol is adopted. The use of RTS/CTS/DATA/ACK significantly reduces the collision and all the nodes within the transmission range of the sender can eavesdrop on the packet successfully with higher probability due to medium reservation. As the data packets are transmitted in a multicast-like form, each of them is identified with a unique tuple (src_ip, seq_no) where src_ip is the IP address of the source node and seq_no is the www.ijiser.com 70 Vol 1 Issue 2 FEB 2014/104

corresponding sequence number. An opportunistic retransmission protocol PRO is proposed to cope with the unreliable wireless channel. Implemented at the link layer, PRO leverages on the path loss information Receiver Signal Strength Indicator (RSSI) to select and prioritize relay nodes. By assigning the higher priority relay a smaller contention window size, the node that has higher packet delivery ratio to the destination will be preferred in relaying. In this paper a position-based opportunistic routing mechanism which can be deployed without complex modification to MAC protocol and achieve multiple receptions without losing the benefit of collision avoidance. MAC Interception We leverage on the broadcast nature of 802.11 MAC: all nodes within the coverage of the sender would receive the signal. However, its RTS/CTS/DATA/ACK mechanism is only designed for unicast. It simply sends out data for all broadcast packets with CSMA. Therefore, packet loss due to collisions would dominate the performance of multicast-like routing protocols. Here, we did some alteration on the packet transmission scenario. In the network layer, we just send the packet via unicast, to the best node which is elected by greedy forwarding as the next hop. In this way, we make full utilization of the collision avoidance supported by 802.11 MAC. In the case of communication hole, we propose a Virtual Destination-based Void Handling (VDVH) scheme in which the advantages of greedy forwarding (e.g., large progress per hop) and opportunistic routing can still be achieved while handling communication voids. We analyse the effect of node mobility on packet delivery and explain the improvement brought about by the participation of forwarding candidates. Since the nodes are randomly and independently distributed in the whole area, without considering the effect of wireless interference (e.g., in light traffic case, as assumed previously), we can roughly accept the independence between hops to simplify our analysis. Actually, the involvement of forwarding candidates will probably introduce a slightly longer end-to-end path length. Here, we ignore such factor for simplicity. The more accurate value of PNh 1hop should thus be lower than that calculated. 3.2 Selection of Forwarding Candidate: One of the key problems in POR is the selection and prioritization of forwarding candidates. Only the nodes located in the forwarding area [8] would get the chance to be backup nodes. The forwarding area is determined by the sender and the next hop node. A node located in the forwarding area satisfies the following two conditions: 1) it makes positive progress toward the destination; and 2) its distance to the next hop node should not exceed half of the transmission range of a wireless node (i.e., R=2) so that ideally all the forwarding candidates can hear from one another. In Fig. 1, the area enclosed by the bold curve is defined as the forwarding area. The nodes in this area, besides node A (i.e., nodes B, C), are potential candidates. According to the required number of backup nodes, some (maybe all) of them will be selected as forwarding candidates. The priority of a forwarding candidate is decided by its distance to the destination. The nearer it is to the destination, the higher priority it will get. When a node sends or forwards a packet, it selects the next hop forwarder as well as the forwarding candidates among its neighbours. The next hop and the candidate list comprise the forwarder list. The candidate list will be attached to the packet header and updated hop by hop. Table 1: forwarding table in POR Only the nodes specified in the candidate list will act as forwarding candidates. The lower the index of the node in the candidate list, the higher priority it has every node maintains a forwarding table for the packets of each flow (identified as source-destination pair) that it has sent or forwarded. Before calculating a new forwarder list, it looks up the forwarding table, an example is illustrated in Table 1, to check if a valid item for that destination is still available. 4. SECURITY IMPLEMENTATION Encryption is the process of converting plain text unhidden to a cryptic text hidden to secure it against data thieves. This process has another part where cryptic text needs to be decrypted on the other end to be understood. Fig.1 shows the simple flow of commonly used encryption algorithms. www.ijiser.com 71 Vol 1 Issue 2 FEB 2014/104

In cryptography, RC4 (also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is the most widely used Symmetric (Private key) stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks). RC4 generates a pseudorandom stream of bits (a keystream). As with any stream cipher, these can be used for encryption by combining it with the plaintext using bit-wise exclusive-or; decryption is performed the same way. To generate the key stream, the cipher makes use of a secret internal state which consists of two parts:1.a permutation of all 256 possible bytes (denoted "S" below).2.two 8-bit index-pointers (denoted "i" and "j"). 4.1 RC4 Algorithm RC4 is a stream cipher, symmetric key algorithm. The same algorithm is used for both encryption and decryption as the data stream is simply XORed with the generated key sequence. The state table is used for subsequent generation of pseudo-random bits and then to generate a pseudorandom stream which is XORed with the plaintext to give the cipher text. The algorithm can be broken into two stages: initialization, and operation. In the initialization stage the 256-bit state table, S is populated, using the key, K as a seed. The initialization process can be summarized by the pseudo-code: j = 0; for i = 0 to 255: S[i] = i; for i = 0 to 255: j = (j + S[i] + K[i]) mod 256; swap S[i] and S[j]; It is important to notice here the swapping of the locations of the numbers 0 to 255 (each of which occurs only once) in the state table. The values of the state table are provided. Once the initialization process is completed, the operation process may be summarized as shown by the pseudo code below; i = j = 0; 50 for (k = 0 to N-1) { i = (i + 1) mod 256; j = (j + S[i]) mod 256; swap S[i] and S[j]; pr = S[ (S[i] + S[j]) mod 256] output M[k] XOR pr } Where M[0..N-1] is the input message consisting of N bits. This algorithm produces a stream of pseudo-random values. The input stream is XORed with these values, bit by bit. The encryption and decryption process is the same as the data stream is simply XORed with the generated key sequence 4.2. RC4 Steps The steps for RC4 encryption algorithm is as follows: 1- Get the data to be encrypted and the selected key. 2- Create two string arrays. 3- Initiate one array with numbers from 0 to 255. 4- Fill the other array with the selected key. 5- Randomize the first array depending on the array of the key. 6- Randomize the first array within itself to generate the final key stream. 7- XOR the final key stream with the data to be encrypted to give cipher text. 5. PERFORMANCE EVALUTION Based on geographic routing and opportunistic forwarding we can design the Position based Opportunistic routing protocol. The nodes are assumed to be aware of their own location and the positions of their direct neighbours. The source node gets the file location of the destination when it wants to transmit a packet and attaches it to the packet header. The multihop path may diverge from the location of the destination and a packet would be dropped even if it has already been delivered into the neighbourhood of the destination due to destination node s movement. The following metrics are used for performance comparison: Packet delivery ratio. The ratio of the number of data packets received at the destination(s) to the number of data packets sent by the source(s). The average and the median end-to-end delay are evaluated, together with the cumulative distribution function of the delay. The average end-to-end path length (number of hops) for successful packet delivery. Packet forwarding times per hop (FTH). The average number of times a www.ijiser.com 72 Vol 1 Issue 2 FEB 2014/104

packet is being forwarded from the perspective of routing layer to deliver a data packet over each hop.. Packet forwarding times per packet (FTP). The average number of times a packet is being forwarded from the perspective of routing layer to deliver a data packet from the source to the destination. Among the metrics, FTH and FTP are designed to evaluate the amount of duplicate forwarding. For unicast style routing protocols, packet reroute caused by path break accounts for FTH being greater than 1. On the other hand, for those packets who fail to be delivered to the destination( s), the efforts that have already been made in forwarding the packets are still considered in the calculation of FTH, as FTH is calculated as follows: where Ns, Nf, and Nr are the number of packets sent at the source(s), forwarded at intermediate nodes, and received at the destination(s), respectively. Nhi is the number of hops for the ith packet that is successfully delivered. Unlike FTH, FTP averages the total number of times a packet is being forwarded on a per-packet basis: 5.1 Forwarding Candidate Number Evaluation We first evaluate the effect of the number of forwarding candidates (i.e., N) on POR s performance. Generally, larger value of N will result in higher robustness as more nodes serve as backups. In addition, the increase in the number of forwarding candidates will also enlarge the packet header, thus introducing more overhead. 6. CONCLUSION In this paper, we propose for a secured and highly reliable data transmission between the source and destination in a vulnerable network. The actual mobile ad hoc network is actually changing leading to dynamic mobile network, where destination location ranges at each time. In the face of recurrent link break as a result of node freedom, substantial info packets could either get lost, or maybe experience lengthy latency prior to restoration of connectivity. Thus we proposed Position based Opportunistic Routing (POR) Protocol that is not susceptible to node mobility and duplicate relaying. Also to increase the security of data, it is encrypted using RC4 algorithm. The data packet is sent in a cipher text format to the destination where it is decrypted to obtain the original data. The problem of communication void also exists. During communication holes, the Position based Opportunistic Routing protocol cannot be used. Thus a Virtual Destination-based Void Handling scheme is implemented to overcome the cons of communication voids. Also, the RC4 encryption algorithm is a symmetric ( private key) stream cipher and is vulnerable to analytic attacks and also susceptible to generate weak keys. Thus to enhance the level of security, stronger encryption algorithm which uses public key can be implemented. REFERENCES [1] J.Broch,D.A.Maltz,D.B.Johnson,Y.C.HU,and Jetcheva, A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols, Proc.ACM MobiCom,PP.85-97,1998. [2] B.Karp and H.T. Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, Proc.ACM MobiCompp.243-254,2000. [3] E.Rozner,J.Seshadri,Y.Mehta an L.Qiu, SOAR:Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh pp.1622-1635,dec.2009. [4] D.Cen,J.Deng and P.Varshney, Selection of a Forwarding Area for Contention-Based Geographic Forwarding in wireless Multi-Hop Networks, IEEE Trrans. Mobile Computing,vol.8,no.5,pp.31111-3122,sept.2007. [5] N.Arad and Y.Shavitt, Minimizing Recovery State in Geographic Ad Hoc Routing, IEEE Trans. Mobile Computing, Vol.8, No.2, pp. 203-217, Feb 2009. [6] M. Mauve, A. Widmer, and H. Hartenstein,(2001) A Survey on Po-sition-Based Routing in Mobile Ad Hoc Networks, IEEE Network, vol. 15, no. 6, pp. 30-39. [7] D. Chen and P. Varshney,(2007) A Survey of Void Handling Tech-niques for Geographic Routing in Wireless Networks, IEEE Comm. Sur-veys and Tutorials, vol. 9, no. 1, pp. 50-67. [8] D. Chen, J. Deng, and P. Varshney,(2007) Selection of a Forward-ing Area for Contention- Based Geographic Forwarding in Wireless Multi-Hop Networks, IEEE Trans. Vehicular Technology, vol. 56, no. 5, pp. 3111-3122. www.ijiser.com 73 Vol 1 Issue 2 FEB 2014/104

[9] N. Arad and Y. Shavitt,(2009) Minimizing Recovery State in Geo-graphic Ad Hoc Routing, IEEE Trans. Mobile Computing, vol. 8, no. 2, pp. 203-217. [10] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin,(2001) Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Net-works, ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 5, no. 4, pp. 11-25. [11] S. Biswas and R. Morris, EXOR: Opportunistic Multi- Hop Routing for Wireless Networks, Proc. ACM SIGCOMM, pp. 133-144, 2005. www.ijiser.com 74 Vol 1 Issue 2 FEB 2014/104