A Review on Security Goals Requirements for the Manets

Abstract

Ad hoc networks are the most prominent field among the researchers to conduct the research in order to provide a solution to the main issue regarding the security of the data that is transferred over the network. As the data follows a particular route for reaching to the destination node and the route creation is done by inter-connecting the most adjacent nodes. In the techniques that ensure security for the transmission of data the emphasis was laid on the reputation of the nodes. In these techniques first the reputation of the nodes is checked and the selection of the route is done. After the selection of the route, the reputation of the each node is updated. This study provides a review to the trust based security mechanism to the data plane in the network which is capable to detect the malicious node that causes to the packet dropping in the network while communication process and also provide a brief presentation of fuzzy interference system.

Authors and Affiliations

Er. Hemant Sharma, Er. Navneet Kaur

Keywords

Related Articles

Gaurav Kumar, Prof. Durgesh Wadbude

We propose a novel compression scheme for digital images using chrominance channels with feature descriptor and Discrete Cosine Transform (DCT). The feature descriptor of chrominance channel is based on their error metr...

Cloud Computing Service and Deployment Models

Cloud computing is a new era it started after the development of parallel computing, grid computing and distributed computing. Many organizations have been started to use cloud computing store their data and provide sec...

Reconfigurable Robots: Opportunities and Challenges

All around the world there is an enormous increase in technological development and its technique implementation, other than human some of the machineries are involved in various work field starts from agricultural to...

Brief Review of De Duplication over Cloud for Optimizing Storage

Cloud storage is one of the services provide in cloud computing which has been increasing in reputation. With the growing data size of cloud computing, a decrease in data volumes could help provider reducing the costs o...

Extracting Development Tasks to Navigate Software System

Many software development organizations and open-source projects attempt to address this challenge by creating web pages that collect the most important information.. Whenever developer build a software, he struggles to...

Download PDF file
  • EP ID EP24216
  • DOI -
  • Views 276
  • Downloads 9

How To Cite

Er. Hemant Sharma, Er. Navneet Kaur (2017). A Review on Security Goals Requirements for the Manets. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24216