Authenticated Routing Protocol Based on Reputation System For Adhoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of the solution to the problem is ARAN – Authenticated routing protocol which is a secure protocol and provides Integrity, Availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses reputation based schemes that an be applied to ARAN to detect selfish node and improve the performance.
Authors and Affiliations
Preeti Nagrath , Ashish kumar , Shikha Bhardwaj
Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification
The phylogenomic classification of protein sequences attempts to categorize a given protein within the evolutionary context of the entire family. It involves mainly four steps: selection of homologous sequences, multiple...
Simulation of A Novel Scalable Group Key Management Protocol for Mobile Adhoc Networks
A Mobile Adhoc Network (MANET) is a collection of autonomous nodes that communicate with each other ,most frequently using a multi-hop wireless network. Secure and multicast group communication is an active area of resea...
An Integer Programming-based Local Search for Large-scale Maximal Covering Problems
Maximal covering problem (MCP) is classified as a linear integer optimization problem which can be effectively solved by integer programming technique. However, as the problem size grows, integer programming requires exc...
COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS
The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue si...
IMAGE SEGMENTATION BY USING EDGE DETECTION
In this paper, we present methods for edge segmentation of atellite images; we used seven techniques for this category; obel operator technique, Prewitt technique, Kiresh technique, Laplacian technique, Canny technique...