DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 4 Issue 2 Date of Publication:   December 2015

Secure Data Transmission in Wireless Sensor Network Using MP-OLSR

P.Bagyalakshmi,R.Anitha

Page(s):   97-101 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.004.002.011 Publisher:   Integrated Intelligent Research (IIR)

Mobile Ad-hoc Network (MANET) is a collection of wireless mobile nodes which dynamically forms a temporary network without the use of any existing network infrastructure or centralized administration. The security in MANET is primary concern in order to provide protected communication between mobile nodes in a hostile environment. In this paper, we present the Secure Message Transmission (SMT) protocol, which safeguards the data transmission against arbitrary malicious behavior of other nodes in multipath environment. The goal of Secure Message Transmission (SMT) is to discover routes in ad hoc network and to ensure secure data forwarding, after the discovery of routes between the source and the destination and although such discovered routes may not be free of malicious nodes. It exploits the redundancy of multipath routing and adapts its operation to remain efficient and effective even in highly adverse environments. The basic idea is to transform a secret message into categories of information in multiple paths. The message and the redundancy are divided into a number of pieces, so that even a partial reception can lead to the successful reconstruction of the message at the receiver. We present the overall system architecture and algorithm for message dispersion and message transmission. We also consider the routing stability in Mobile Ad-hoc Network (MANET) because its environment is more selfish. So we extended the data dispersion along with multipath Optimized Link State Routing Protocol (OLSRP). Our simulation study shows that this approach is useful as it enhances the security in multipath routing Network.