An Implementation on Detection of Trusted service provider in Mobile Ad-hoc Networks

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 11, Issue 2

Abstract

The mobile ad-hoc network consists of energy constraint devices called nodes communicating through radio signals forming a temporary network i.e. nodes are continuously switching from one network to another. To minimize the power consumption, we form the clusters with an elected cluster head (Service Provider) based on any cluster head selection strategy. As the topology of this network is time variant attributable to node mobility, nodes are continuously leaving and entering the clusters, automatically registering with the cluster head to become the member of the cluster. But, there can be a scenario where a new node wants to access a service provided by the cluster head, at this time the newly entered node is unaware of the trustworthiness of the cluster head. To establish a trusted link amongst newly entered node and CH we have adopted an indirect trust computation technique based on recommendations, which form an important component in trust-based access control models for pervasive environment. It can provide the new node the confidence to interact with unknown service provider or CH to establish a trusted link for reliable accessibility of the service. In this paper, we shall present some existing indirect trust based techniques and subsequently discuss our proposal along with its merits and future scope.

Authors and Affiliations

Mr. Rahul A Jichkar , Dr. M. B. Chandak

Keywords

Related Articles

Analytical Performance of LDPC Codes with OC in the Presence of Interferers

Optimum Combining (OC) with Low Density Parity-check (LDPC) code improves the performance of overall system (LDPC-OC) by providing additional coding gain. Using Gaussian approximation (GA) approach the bit error rate of...

Sensors based Wearable and Systems for Detection of Human Movement and Fall

Human computer interaction system is a study of relationship between people and computers mediated information. The future of human computer interaction systems lies in how intelligently these systems can take into accou...

 ADVANCED MODELISTIC APPROACH OF FLOWSHOP SCHEDULING PROBLEM FOR 10-JOBS, 10-MACHINES BY HEURISTICS MODELS USING MAKESPAN CRITERION

 Production scheduling is generally considered to be the one of the most significant issue in the planning and operation of a manufacturing system. Better scheduling system has significant impact on cost reduct...

Using TAM Model To Measure The Use Of Social Media For Collaborative Learning 

The social media have all generations of Internet users, becoming a prominent communications tool and found to be facilitating teaching and learning by collaborative learning, the part of sharing and collaborating activi...

 Comparison of Current Modes in CMOS Analog Multipliers

 A study and comparison between current mode CMOS analog multiplier, ±1.5 V High frequency four quadrant current multiplier and ±1.2 V High frequency four quadrant current multiplier has been carried out in this pap...

Download PDF file
  • EP ID EP94426
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Mr. Rahul A Jichkar, Dr. M. B. Chandak (2014). An Implementation on Detection of Trusted service provider in Mobile Ad-hoc Networks. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 11(2), 64-74. https://europub.co.uk/articles/-A-94426