A Trusted Identity Acknowledgement Protocol for Security Enhancement in MANET
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 4
Abstract
Identifying trusted node for secure communication is a very important point in mobile adhoc network. It makes a node to compromise for a service and causes uncertainty of node behaviour. Computing a node trust and managing are highly demanding issues in mobile ad hoc network due to its limitation of resources, process complexity and high mobility nature. We present a protocol based on a node trust identity acknowledgement (TIA) in this paper to enhance the security issue in MANET. This prevent from the anomalous node to intrude in the network and improvise the security and throughput. We compute a node trust identity based on four depending factors as, Truth_factor, False_factor, Throughput_factor and Drop_factor rate. The experimental evaluation results shows an enhancement in throughput with low packet drop and computation overhead in compare to existing protocols.
Authors and Affiliations
V. L. Pavani, Research Scholar, B. Sathyanarayana
Underwater Wireless Sensor Network Communication Using Electromagnetic Waves
An investigation of submerged Wireless Sensor network utilizing electromagnetic waves is presented as a part of this paper. under water communication require exceptionally effective radio wires for remote correspondence...
Performance Enhancement of Sliding Mode Control Using Fuzzy Logic: An Application And Analysis
Sliding mode control (SMC) is an efficient tool in design of robust controller for nonlinear plants. The main advantage of sliding mode control is order reduction and making the system practically independent of vari...
LD: A Leak Detector Mechanism For Finding Misbehaving Nodes In MANETS
MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. Due to the open medium an...
Enhanced Intrusion Detection System with Mobile Agent
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...
A Review of Resource Allocation and Task scheduling for Computational Grids based on Meta-heuristic Function
The current scenario of grid computing faced a problem of job failure and increase of execution time of jobs. The failure of job degraded the performance of grid computing. The failure and increase execution time dep...