An Analysis on Endaira: A Provably Secure On-Demand Source Routing Protocol

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Routing is one of the most basic networking functions in mobile ad hoc networks. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. Hence, an adversary can easily paralyze the operation of the network by attacking the routing protocol. This has been realized by many researchers, and several “secure” routing protocols have been proposed for ad hoc networks. There are some secure routing protocols that have been proposed to reduce the risk of attacking the routing protocol by Denial of Service, hackers and so on. In this research, we will explore and discuss a new ondemand source routing protocol, called ENDAIRA, and we demonstrate the usage of our framework by proving that it is most secure routing protocol. We assess the simulation study to compare and prove the strength of ENDAIRA model among the other secure routing protocol.

Authors and Affiliations

A. F. A. Abidin , N. S. M. Usop , N. H. N. Zulkifli

Keywords

Related Articles

Architectural Based Data Aggregation Techniques in Wireless Sensor Network: A Comparative Study

Data aggregation is very crucial techniques in wireless sensor network. Because with the help of data aggregation we reduce the energy consumption by eliminating redundancy .when wireless sensor network deployed in remot...

MINING THE INVESTOR’S PERCEPTION ABOUT DIFFERENT INVESTMENT OPTIONS USING CLUSTERING ANALYSIS

Investors’ expectation is a very significant factor that needs to be evaluating by all investment alternatives. The achievement of any investment policy depends on how successfully it has been able to convene the investo...

An Algorithm for Better Decision Tree

The present paper aims at constructing the decision tree for a given database which adopts an improved ID3 decision tree algorithm to implement data mining in order to predict the output. The database is generated using...

An Efficient Clustering Technique for Message Passing Between Data Points using Affinity Propagation

A wide range of clustering algorithms is available in literature and still an open area for researcher’s k-means algorithm is one of the basic and most simple partitioning clustering technique is given by Macqueen in 196...

BOILER EFFICIENCY EVALUATION AND MONITORING THROUGH DATA MINING TECHNIQUES IN TEXTILE INDUSTRY

Cost of energy is the highest among all other components in the production of textile products. So energy efficiency analysis and control has assumed paramount importance. Boiler consumes measure chunk of fuel in any pro...

Download PDF file
  • EP ID EP160581
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

A. F. A. Abidin, N. S. M. Usop, N. H. N. Zulkifli (2010). An Analysis on Endaira: A Provably Secure On-Demand Source Routing Protocol. International Journal on Computer Science and Engineering, 2(3), 437-442. https://europub.co.uk/articles/-A-160581