A Secure Routing Protocol for Mitigating Adversary Nodes in Mobile Ad-Hoc Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
The secure routing of MANETs(mobile ad-hoc networks) is still problem in now a day. In this project, a secure routing protocol design for new approach. The existing system says that allowing only legitimate nodes to participate in the bootstrapping process and trying to detect adversary nodes after they are participate in the routing protocol. It does not need secrete channel for route setup. It does not need flooding to setup initial routing. The proposing of existing system, maintain the routes properly in network and detect the adversary nodes whenever enter into network. Here we extend the routes for secure communication from legitimate nodes to controller. We use end to end secure communication protocol and prolonging network lifetime.
Authors and Affiliations
Mohammed Adil Adnan, Jaganmohana Rao Malla
Self-Learning Network Traffic Classification
Network management is part of traffic engineering and security. The current solutions - Deep Packet Inspection (DPI) and statistical classification rely on the availability of a training set. In case of these there is a...
Communication system in aircraft using Software Defined Radio (SDR)
Software Defined Radio (SDR) is a hot topic of wireless communication research in recent trends. The idea of SDR is to use ultra-high speed sampling and ADC/DAC modules directly measure the received radio signal and dec...
A Study on Workflow Scheduling Algorithms in Cloud
Cloud computing is one of the budding domains that has gained popularity in the recent years. It offers utility-oriented IT services to the users worldwide over the internet. In cloud, service providers manage and provi...
Innovative method for Iris melanoma detection
Iris Melanoma is one of the type of eye tumor. Iris is colored part of eye that surrounds pupil. The Melanoma is tumor which grows and develops in tissues in middle layer of eyeball. Symptoms of Melanoma are dark spots...
Review Study of Leach Protocol
WSN is a wireless Sensor Network which is a power constrained system. In WSN nodes have limited power batteries which depend upon energy efficiency. In WSN there is major issue of energy efficiency. Energy can be consum...