A Review on Security Goals Requirements for the Manets

Abstract

Ad hoc networks are the most prominent field among the researchers to conduct the research in order to provide a solution to the main issue regarding the security of the data that is transferred over the network. As the data follows a particular route for reaching to the destination node and the route creation is done by inter-connecting the most adjacent nodes. In the techniques that ensure security for the transmission of data the emphasis was laid on the reputation of the nodes. In these techniques first the reputation of the nodes is checked and the selection of the route is done. After the selection of the route, the reputation of the each node is updated. This study provides a review to the trust based security mechanism to the data plane in the network which is capable to detect the malicious node that causes to the packet dropping in the network while communication process and also provide a brief presentation of fuzzy interference system.

Authors and Affiliations

Er. Hemant Sharma, Er. Navneet Kaur

Keywords

Related Articles

slugPower Efficient Fir Filter Design

Finite Impulse Response (FIR) digital filter is basic component in communication systems and in many digital signal processing (DSP). FIR filter is broadly used in portable application with small area and low power. In...

Battery Health Monitoring System with State Of Charge Estimation Using Artificial Neural Network

Today Battery is an essential component of all critical electrical systems. Battery stores chemical, not electricity. Two different lead in an acid mixture react to produce an electrical pressure. This electrochemical r...

Establishment of Regenerative Callus, Cell Suspension System and Molecular Characterization of Stevia Rebaudiana Bertoni for the Production of Stevioside in In Vitro

An efficient and standardized medium for callus induction was developed using leaf explants cultured on MS medium supplemented with 1.0mgl-1 1-Naphthaleneacetic acid (NAA) and 1.0 mgl-1 2,4-dichlorophenoxyacetic acid (2...

slugAndroid Environment Security Through Penetration Testing Methodology

The fluidity of application markets complicate Smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characterist...

slugA Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack in Wireless Sensor Networks

This Paper reviews about the wireless sensor networks architectures, applications, characteristics, benefits, types of wireless sensor networks and attacks and their detection and prevention techniques of attacks. Wirel...

Download PDF file
  • EP ID EP24216
  • DOI -
  • Views 310
  • Downloads 9

How To Cite

Er. Hemant Sharma, Er. Navneet Kaur (2017). A Review on Security Goals Requirements for the Manets. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24216