An Implementation on Detection of Trusted service provider in Mobile Ad-hoc Networks

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 11, Issue 2

Abstract

The mobile ad-hoc network consists of energy constraint devices called nodes communicating through radio signals forming a temporary network i.e. nodes are continuously switching from one network to another. To minimize the power consumption, we form the clusters with an elected cluster head (Service Provider) based on any cluster head selection strategy. As the topology of this network is time variant attributable to node mobility, nodes are continuously leaving and entering the clusters, automatically registering with the cluster head to become the member of the cluster. But, there can be a scenario where a new node wants to access a service provided by the cluster head, at this time the newly entered node is unaware of the trustworthiness of the cluster head. To establish a trusted link amongst newly entered node and CH we have adopted an indirect trust computation technique based on recommendations, which form an important component in trust-based access control models for pervasive environment. It can provide the new node the confidence to interact with unknown service provider or CH to establish a trusted link for reliable accessibility of the service. In this paper, we shall present some existing indirect trust based techniques and subsequently discuss our proposal along with its merits and future scope.

Authors and Affiliations

Mr. Rahul A Jichkar , Dr. M. B. Chandak

Keywords

Related Articles

 Implementation of Web Based Intelligent Substation Power Equipment Monitoring and Controlling System

 The paper proposes an innovative design to develop a system based on ARM micro controller that is used for monitoring the voltage, current and temperature of a substation and to protect the system from the rise in...

Contingency Ranking and Analysis Using Mipower

Maintaining power system security is one of the challenging tasks for the power system engineers. The security assessment is an essential task as it gives the knowledge about the system state in the event of a contingenc...

Potential of Hydro Power Plant in India and its Impact on Environment

This paper presents a survey report of hydro power plant in India. There are various renewable energy resources like sun, wind, water, ocean, tidal etc. Among all the source, hydro plant are emerging in the developing In...

 A HYBRID BIOMETRIC AUTHENTICATION ALGORITHM

 A facial recognition system is a computer based application for automatically identifying or verifying a person from a digital image. One of the ways to do this is by comparing the selected facial features from t...

 Comparison of Bending Stresses for Different Face Width of Helical Gear Obtained Using Matlab Simulink with AGMA and ANSYS

 Helical gears are widely used in industry where the power transmission is required at heavy loads with smoother and noiseless operation. The study in this paper shows that the complex design problem of helical gear...

Download PDF file
  • EP ID EP94426
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Mr. Rahul A Jichkar, Dr. M. B. Chandak (2014). An Implementation on Detection of Trusted service provider in Mobile Ad-hoc Networks. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 11(2), 64-74. https://europub.co.uk/articles/-A-94426