A Review on Security Goals Requirements for the Manets
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Ad hoc networks are the most prominent field among the researchers to conduct the research in order to provide a solution to the main issue regarding the security of the data that is transferred over the network. As the data follows a particular route for reaching to the destination node and the route creation is done by inter-connecting the most adjacent nodes. In the techniques that ensure security for the transmission of data the emphasis was laid on the reputation of the nodes. In these techniques first the reputation of the nodes is checked and the selection of the route is done. After the selection of the route, the reputation of the each node is updated. This study provides a review to the trust based security mechanism to the data plane in the network which is capable to detect the malicious node that causes to the packet dropping in the network while communication process and also provide a brief presentation of fuzzy interference system.
Authors and Affiliations
Er. Hemant Sharma, Er. Navneet Kaur
Efficient Fuzzy Traffic Adaptation Solution in Wireless Mesh Networks
As wireless communication gains more advancement, significant research has been developed and adapted to support real time transmission which strengthens quality of services. Requirement for wireless communication and...
Implementation of an efficient low complexity method for wireless CE using a BEM for the wireless channel taps.
The matrix representation of the signal model of MIMO-OFDM systems, which clearly describes the relation of signals in frequency domain and time domain and expressing operations like adding CP and removing CP as matrix...
Security Of Cloud Data With Logging Using Jar File
Now-a-days, Cloud Computing technology is growing at a very fast pace. Currently, most of the people are using Cloud Computing technology. Cloud computing allows extremely scalable services to be consumed at ease over t...
Saline Infusion Level Detection and Heart Rate Monitoring System
Now days, it is not possible for an attendant to stay beside the patient all the time. This has increased the need for proper monitoring equipment. The project aims to modify an existing safety model employed in domesti...
A Novel Approach for Security Enhancement in IPsec by a New Secured Internet Key Exchange Protocol
IPSec is a network layer security protocol that provides security for internet communications at the IP layer by authenticating and encrypting each IP packet of a communication session. The security properties of IPsec...