Improving Performance with Security Mechanism for Wireless Multi-Hop Relay Network
Ambati Raghu
Ambati Raghu, Garudubhadra (Post), Vajrapukotturu, Srikakulam, Andrapradesh, India.
Manuscript received on May 21, 2014. | Revised Manuscript received on June 06, 2014. | Manuscript published on June 30, 2014. | PP: 103-108  | Volume-3, Issue-5, June 2014.  | Retrieval Number:  E3140063514/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Wireless relay network consist of distribution of network topology commonly used in wireless network. Where it sender and receiver are interconnected by mean some of mobile nodes. Relay technology are used enhance packet delivery and increase performance of wireless networks such as worldwide interoperability for microwave access and LTE-A. Later developed automatic repeat request (ARQ) [11]technique that to reduced packet lose and increase latency but we recognizes potential drawbacks of automatic repeat request techniques that’s are ambiguous error report, packet overhead and number of acknowledgement in case of successful received data. Authentication schema is most important factor in relay network to secure, protect from attackers because of thousands of users are communicated each other’s without any identification. Authentications in relay network have been proposed public-key cryptographic algorithm developed based on Diffie-Hellman key exchange algorithm. The process of Diffie-Hellman key exchange algorithm is two users to securely exchange a keys that keys ultimately using to encrypt the message. Our research is going on reduced workload in relay network and improve performance by consider some Components that mobility factor, battery power and workload. These components Consider to establishing reliable path to reduced delay and increase data transmission speed and finally data transmission is one of major problem in wireless network then we consider hop-by-hop scheme.
Keywords: Authentication, Establish reliable path, Hop-byhop Communication.