Skip to main content

Effect of Data Encryption on Wireless Ad Hoc Network Performance

  • Conference paper
Distributed Computing - IWDC 2004 (IWDC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3326))

Included in the following conference series:

Abstract

In this paper we studied various routing algorithms for ad hoc networks to explain why Ad hoc On Demand Distance Vector (AODV) should be chosen over other possible rotuing algorithms. We then the effect of applying encryption over AODV [5] to data payload on different parameters such as delay, queue size, throughput, retransmission attempts, channel back-off etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rc4 encryption algorithm, history and description, http://www.ncat.edu/grogans/algorithm_history_and_description.htm

  2. www.opnet.com

  3. Garg, V., Ghosh, R.K.: Effect of data encryption on wireless ad hoc networks performance. Technical report, IIT-Kanpur, Department of CSE (2003)

    Google Scholar 

  4. Zhou, L., Haas, Z.J.: Securing adhoc networks. IEEE Network Magazine 13(6) (1999)

    Google Scholar 

  5. Perkins, C.: Ad hoc on demand distance vector (aodv) routing. Internet draft, draft-ietf-manet-aodv-00.txt

    Google Scholar 

  6. Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Magazine on Personal Communication 17(8), 46–55 (1999)

    Article  Google Scholar 

  7. Toh, C.-K.: Ad Hoc Mobile Wireless Networks – Protocols and Systems. Prentice Hall, Upper Saddle River (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Garg, V.K., Ghosh, R.K. (2004). Effect of Data Encryption on Wireless Ad Hoc Network Performance. In: Sen, A., Das, N., Das, S.K., Sinha, B.P. (eds) Distributed Computing - IWDC 2004. IWDC 2004. Lecture Notes in Computer Science, vol 3326. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30536-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30536-1_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24076-1

  • Online ISBN: 978-3-540-30536-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics