A Review on Security Goals Requirements for the Manets

Abstract

Ad hoc networks are the most prominent field among the researchers to conduct the research in order to provide a solution to the main issue regarding the security of the data that is transferred over the network. As the data follows a particular route for reaching to the destination node and the route creation is done by inter-connecting the most adjacent nodes. In the techniques that ensure security for the transmission of data the emphasis was laid on the reputation of the nodes. In these techniques first the reputation of the nodes is checked and the selection of the route is done. After the selection of the route, the reputation of the each node is updated. This study provides a review to the trust based security mechanism to the data plane in the network which is capable to detect the malicious node that causes to the packet dropping in the network while communication process and also provide a brief presentation of fuzzy interference system.

Authors and Affiliations

Er. Hemant Sharma, Er. Navneet Kaur

Keywords

Related Articles

Pattern variation at different Prandtl Number in Natural convective MHD flow past a low -heat -resistance sheet with internal heating: A Numerical Study

In this paper an attempt has been taken to understand the variation of prandtl number for MHD natural convective fluid flow past a low heat resistance sheet with internal heating. The boundary layer flow in viscous medi...

slugFormulation of a Model and Analysis of Mechanical Timer Parameters by Using Response Surface Method in MINITAB

Aim of this paper is to development methodology in MINITAB for design parameter analysis of mechanical timer unit which will give us required time delay, by forming mathematical model .Design parameters analysis was car...

A Guarantee and Service Provider Based GeTrust Model in Chord-Based P2p Networks

more and more users are attracted by p2p networks characterized by decentralization, autonomy and anonymity. However, users’ unconstrained behavior makes it necessary to use a trust model when establishing trust relatio...

An Ensemble Model for Classification of Phishing e-mail

Phishing attack is one of the critical issues that access sensitive information from e-mail users like banking password, credit card information and other details. Phishing e-mail not only wastage the storage space in m...

Controller Area Networks (Can) Evolution, Response Time Analysis and Applications

Initially designed as a new mean in providing communication network between control units in automotive industries, the controller area network (CAN) has shown a great surge of interest due to its vast advantages. Since...

Download PDF file
  • EP ID EP24216
  • DOI -
  • Views 255
  • Downloads 9

How To Cite

Er. Hemant Sharma, Er. Navneet Kaur (2017). A Review on Security Goals Requirements for the Manets. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24216