A Secure Routing Protocol for Mitigating Adversary Nodes in Mobile Ad-Hoc Networks

Abstract

The secure routing of MANETs(mobile ad-hoc networks) is still problem in now a day. In this project, a secure routing protocol design for new approach. The existing system says that allowing only legitimate nodes to participate in the bootstrapping process and trying to detect adversary nodes after they are participate in the routing protocol. It does not need secrete channel for route setup. It does not need flooding to setup initial routing. The proposing of existing system, maintain the routes properly in network and detect the adversary nodes whenever enter into network. Here we extend the routes for secure communication from legitimate nodes to controller. We use end to end secure communication protocol and prolonging network lifetime.

Authors and Affiliations

Mohammed Adil Adnan, Jaganmohana Rao Malla

Keywords

Related Articles

Load Balanced Geographic Routing In Wireless Sensor Networks

A wireless sensor network (WSN) is used to monitor environmental conditions, such as sound, pressure, temperature etc. and to simultaneously share their data via the network to the destination. They are enabling control...

Influence of Curing Types on Properties of Concrete Using Slag Replacement

The influence of curing types on properties of concrete along with different percentage of cement replacement is studied. Air curing and accelerated curing are compared to water curing. Four types of mixes (i.e., with d...

LI-FI Innovation With Coordinated Sun Powered Boards For Country Information Availability

This paper proposes a novel accepted on how Li-Fi information can be joined close by sunlight based boards that not simply deed as a control premise for LIFI systems however furthermore as broadband web beneficiaries of...

A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Public Cloud environment

Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product w...

Analysis of CT Liver Images Using Level Sets with Bayesian Analysis-A Hybrid Approach

Computer tomography images are widely used in the diagnosis of liver tumor analysis because of its faster acquisition and compatibility with most life support devices. Accurate image segmentation is very sensitive in th...

Download PDF file
  • EP ID EP22314
  • DOI -
  • Views 228
  • Downloads 5

How To Cite

Mohammed Adil Adnan, Jaganmohana Rao Malla (2016). A Secure Routing Protocol for Mitigating Adversary Nodes in Mobile Ad-Hoc Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(6), -. https://europub.co.uk/articles/-A-22314