A Secure Routing Protocol for Mitigating Adversary Nodes in Mobile Ad-Hoc Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
The secure routing of MANETs(mobile ad-hoc networks) is still problem in now a day. In this project, a secure routing protocol design for new approach. The existing system says that allowing only legitimate nodes to participate in the bootstrapping process and trying to detect adversary nodes after they are participate in the routing protocol. It does not need secrete channel for route setup. It does not need flooding to setup initial routing. The proposing of existing system, maintain the routes properly in network and detect the adversary nodes whenever enter into network. Here we extend the routes for secure communication from legitimate nodes to controller. We use end to end secure communication protocol and prolonging network lifetime.
Authors and Affiliations
Mohammed Adil Adnan, Jaganmohana Rao Malla
Load Balanced Geographic Routing In Wireless Sensor Networks
A wireless sensor network (WSN) is used to monitor environmental conditions, such as sound, pressure, temperature etc. and to simultaneously share their data via the network to the destination. They are enabling control...
Influence of Curing Types on Properties of Concrete Using Slag Replacement
The influence of curing types on properties of concrete along with different percentage of cement replacement is studied. Air curing and accelerated curing are compared to water curing. Four types of mixes (i.e., with d...
LI-FI Innovation With Coordinated Sun Powered Boards For Country Information Availability
This paper proposes a novel accepted on how Li-Fi information can be joined close by sunlight based boards that not simply deed as a control premise for LIFI systems however furthermore as broadband web beneficiaries of...
A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Public Cloud environment
Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product w...
Analysis of CT Liver Images Using Level Sets with Bayesian Analysis-A Hybrid Approach
Computer tomography images are widely used in the diagnosis of liver tumor analysis because of its faster acquisition and compatibility with most life support devices. Accurate image segmentation is very sensitive in th...