Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2014, Vol 4, Issue 1
Abstract
In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to establish communication between nodes. Here source node will have to generate and store a key called KEY2 and destination node will have to generate and store a key called KEY1. When source node initiates communication with destination-node, source node will send a requestpacket to destination via shortest/less- cost path (PATH1) without any key mentioning in the packet. Now destination node will send the requested packet and KEY1 to source node via different path other than PATH1 (path of received packet). Source will send KEY2 to destination again through the same path (PATH2). In scenario-2, communication of each node is based on the neighbour node’s priority, here, priority-1 being the highest, hence it is highly recommended for communication and priority three is being the lowest and it is rarely recommended for the communication. Nodes in the network classified into 3 types, unknown node, neighbor’s known node, nonneighbors known node. Priority of nodes can be evaluated based on the security measures, energy level and other parameters of the node. It can also consider Trust Value (TV) of each node based on the duration spent in active efficient communication. With help of this strategy, we can achieve highly secured route discovery, which will help network to have smooth communication among its nodes.
Authors and Affiliations
Chandrakant N| Bangalore, Karnataka, India
A Principal Component Analysis Method for Recognition of Human Faces: Eigenfaces Approach
Facial recognition is a biometric method of identifying a person based on a picture of their face. Facial recognition system is very much important for security, surveillance and in forensics. In this paper, a face recog...
A Lossless Secret Image Sharing Scheme based on Pixel Partitioning
Secret sharing method divides a secret into some components called shadow images where each shadow image looks meaningless. Based on this idea, we propose a simple secret image sharing scheme in this article. This schem...
VLSI Implementation of Fixed-Width Booth Multiplier Based on PEB Circuit
This paper investigates methods of implementing binary multiplication with the smallest possible latency. A probabilistic estimation bias (PEB) circuit for a fixed-width two’s complement Booth multiplier is proposed for...
Multicast Multi-path Routing Technology in Mobile ADHOC Networks Improving Power Efficiency
The proposal of this paper presents a measurement-based routing algorithm to load balance intra domain traffic along multiple paths for multiple multicast sources. Multiple paths are established using application-layer o...
Text to Speech Conversion with Phonematic Concatenation
This paper presents a method to design a Text to Speech conversion module by the use of Matlab by simple matrix operations. Firstly by the use of microphone some similar sounding words are recorded using a record program...