5.1 Use case diagram
A use case diagram at its simplest is a representation of a user's interaction with the system that shows the relationship between the user and the different use cases in which the user is involved. A use case diagram can identify the different types of users of a system. The different use cases and will often be accompanied by other types of diagrams as well.
Figure 5.2: Use case Diagram
5.3 Use Case Analysis
5.3.1 Activity Diagram
The following activity diagram represents the flow where the node is checked for attacker and honest node.
Steps:
1. Initially network starts the transfer of packets through the AODV protocol.
2. Next the type of node is identified as normal node or attacker node(malicious …show more content…
By using central authentication we can achieve our goal by saving the energy of nodes.
Figure 7.23 : Energy loss vs Time
7.3 Route Tracking Technique
7.3.1 Execution of Route Tracking Technique
Route tracking technique is trust based system which is used to avoid vampire attack. In this technique, trust value is provided to each and every node. Node with the trust value 1 is considered as trusted node and node with the trust value is considered as untrusted node. So that, untrusted nodes are getting neglected and packets are sent only through the nodes having trusted value.
In the figure 7.24, scenario shows that node number 14 is source node and node number 2 is destination node. Figure 7.24: Route Tracking Technique (a)
Figure 7.25 shows the Trust Manager, which defines the trust values for each and every node. As we can see in the previous scenario which is shown in the figure 7.18, Node 14 is source node which is having node number 5 as shortest distance neighbor but it includes node number 6 instead of node number 5. Because node number 5 having the trust value 0 so that it may b consider as malicious node.
Figure 7.25: Trust …show more content…
586-590.
[112] Er.Richa Sharma, Dr.Rajiv Mahajan, Er.Satish Kumar,” Evaluating the performance of wireless network with & without load balancing using OPNET modeller”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 3, Issue 6, June 2014, pp. 2076-2080.
2. Vasserman E.Y., Hopper N.,”Vampire Attacks: Draining Life from Wireless Ad Hoc Networks”, Mobile Computing, IEEE Transactions on, vol.12, no.2, Feb. 2013, pp.318-332.
3. S.Prasanna, Srinivasa Rao, “An Overview of Wireless Sensor Networks Applications and Security”, International Journal of Soft Computing and Engineering, vol.2, no.2, May 2012, pp. 538-540.
4. Shio Kumar Singh, M P Singh, and D K Singh, “Energy Efficient Homogenous Clustering Algorithm for Wireless Sensor Networks”, International Journal of Wireless & Mobile Networks, vol.2, no.3, Aug. 2010, pp. 49-61.
5. D. G. Reina, M. Askalani, S. L. Toral, F. Barrero, E. Asimakopoulou, and N. Bessis, “A Survey on Multihop Ad Hoc Networks for Disaster Response Scenarios”, International Journal of Distributed Sensor Networks,