Secure and Proficient Unnamed Air Vehicles Using Encryption Technique and Particle Swarm Optimization Based on Wireless Mesh Network

File Size:
1.28 MB
Volume 2, Issue 10 (October, 2016)
Publication No:
Jagbeer Singh, Sachin Majithia
15 x

Unnamed Aerial Vehicles joined with Wireless Mesh Network have enabled the appearance of airborne network assisted requests. In attacks relief, they are main solutions for (a) On-request ubiquitous network access (b) Size areas efficient. These solutions still face major challenges as Wireless Mesh Network is advantages to encryption algorithm and Attacks. Accordingly, the network can be damages and the attacker might change payload data or even loss the Unnamed Aerial Vehicles. Security Standards, such as the IEEE 802.11i and the security mechanisms of the IEEE 802.11s mesh standard, are vulnerable to routing hijackers as we research showed in prior works. In previous work used secure routing protocol is indispensable for making feasible the plotting of Unnamed Aerial Vehicles in Wireless Mesh Network. The study of existing papers, here the previous issues found the Wireless Mesh Network i.e Data Loss cause of wormhole attack means it consists in recording traffic from one section of the network and replaying it in a different region, Less Packet Delivery and Error. The existing approach used to PASER routing protocol to improve the Performance of Packet Delivery Rate value is 70%. In accurate UAV-WMN scenarios, Compare PASER achieves presentation results as the well-established; Encryption-Optimization combined with the IEEE 802.11s security. Here the proposed approach presents the Encryption Algorithm to improve the Hijacker problem and information loss. Our proposal defines wormhole attack than the security apparatus and well-defined secure IPSO, without making mechanisms. restrictive assumptions. We calculate the performance parameters result achieved like Packet Delivery rate is 97%, throughput is 90% or less end to end Delay.

Wireless Mesh Network, Secure Routing Protocol, PASER Protocol and PSO (Particle Swarm Optimization) Technique.