A Trusted Identity Acknowledgement Protocol for Security Enhancement in MANET
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 4
Abstract
Identifying trusted node for secure communication is a very important point in mobile adhoc network. It makes a node to compromise for a service and causes uncertainty of node behaviour. Computing a node trust and managing are highly demanding issues in mobile ad hoc network due to its limitation of resources, process complexity and high mobility nature. We present a protocol based on a node trust identity acknowledgement (TIA) in this paper to enhance the security issue in MANET. This prevent from the anomalous node to intrude in the network and improvise the security and throughput. We compute a node trust identity based on four depending factors as, Truth_factor, False_factor, Throughput_factor and Drop_factor rate. The experimental evaluation results shows an enhancement in throughput with low packet drop and computation overhead in compare to existing protocols.
Authors and Affiliations
V. L. Pavani, Research Scholar, B. Sathyanarayana
Methods To Enhance The Security And Embedding Capacity Of Steganography
The major requirement for most of the steganographic method is to improve the security to the hidden data and to enhance the amount of data that can be embedded into the cover medium. The paper mainly studies on the...
Detection and management of SPIT calls in VoiceOver-IP Services
Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such...
Energy efficiency analysis of Compressed Sensing Video Streaming for Wireless Multimedia Sensors
Multimedia Wireless Sensor Network (MWSN) [3] provides a low-cost and flexible solution for distributed video surveillance based on low-power autonomous camera sensor nodes. The profile of these MWSN-based distribute...
An Effective Cost Optimization for Thickness Measurement of Metallic Plates
A sensor is a device which receives and responds to a signal when touched. A sensor's sensitivity indicates how much the sensor's output changes when the measured quantity changes. It measures a physical quantity and...
Concert demonstrable data self-control for Integrity Verification in Multi-Cloud Storage
The Provable data possession (PDP) is a technique for ensure the integrity of data in storage out sourcing. In this paper we addresses the construction of an efficient PDP scheme for distribute cloud data storage to...