Mobile ad-hoc network (MANET) has attracted the attention of networking industries owning to their desirable characteristics such as multi-hop routing, self-configuration, selfhealing, self-managing, reliability, and scalability. Routing over wireless mobile networks is a critical problem due to the dynamic nature of the link qualities, even when nodes are static. A key challenge in MANETs is the need for an efficient routing protocol that establishes a route according to certain performance metrics related to the link quality. The routing issue in MANETs is generally concerned with finding a good path between the source and the destination pairs. Based on that, there is a demand for the development of a high throughput routing protocol. The impact of a single-path routing protocol and a multi path routing protocol on the performance of MANETs is required to be investigated. In this work, a performance comparison in terms of throughput, packet delivery, routing overhead, and end to end delay of wellknown routing protocols such as AODV, AOMDV, and OLSR using network simulator version 2 (NS-2) has been introduced. The simulation results of this work show that the single-path AODV protocol out performance the multi path OLSR and AOMDV protocols in terms of throughput and packet delivery ratio. In addition to that, the single-path routing protocol presents less routing overhead in comparison to the AOMDV and OLSR. While the OLSR and AOMDV demonstrate a relatively better end to end delay in comparison to the AODV protocol.
Security of digital images has become one of the most important issues in network technologies. Different techniques have been evolved over the past few years to provide security for digital images through concealing information, image scrambling and image encryption. The aim of this work is to enhance the network security level by using the cryptographic method based on the Least Square Approximation technique (LSA). This work is one of the first attempts due to the use of the least squares polynomial of fifth degree technique as data interpolation in the image cryptography process. It has been proven in this study that a high level of correlation exists amongst the original and the corresponding decrypted images. The achieved high values of the measured Peak Signal to Noise Ratio (PSNR) for the decrypted images in this study are an indication to the high accuracy of the proposed technique in comparison to other cryptographic techniques. The output of the encrypted technique in this study reveals its reliability and robustness against security attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.