Authenticated Routing Protocol Based on Reputation System For Adhoc Networks

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9

Abstract

Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of the solution to the problem is ARAN – Authenticated routing protocol which is a secure protocol and provides Integrity, Availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses reputation based schemes that an be applied to ARAN to detect selfish node and improve the performance.

Authors and Affiliations

Preeti Nagrath , Ashish kumar , Shikha Bhardwaj

Keywords

Related Articles

EX-SMAC: An Adaptive Low Latency Energy Efficient MAC Protocol

In wireless sensor network the efficient use of energy leads to enhance the network lifetime. As idle listening, collision, control overhead and over hearing are the main reasons of energy waste. Many typical MAC protoco...

A Layered Approach for Watermarking In Images Based On Huffman Coding

With the rapid increase of the internet users and the bandwidth is appreciable but at the same also brought some problems beside its advantages. The great facility in copying a digital content rapidly, perfectly and with...

Bitwise Operations Based Encryption and Decryption

In this paper, variable block length based character/bit level ransformation has been proposed for encryption and cryption, where a block of characters /few bits has taken into account. he originated text is transfor...

A Bit Level Session Based Encryption Technique to Enhance Information Security

In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files...

Specifying a model of semantic web service composition

One of the major issues of semantic web is the discovery and identification of the best service that responds to a user request. In this article we specify a semantic web services composition model built through an ontol...

Download PDF file
  • EP ID EP139753
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Preeti Nagrath, Ashish kumar, Shikha Bhardwaj (2010). Authenticated Routing Protocol Based on Reputation System For Adhoc Networks. International Journal on Computer Science and Engineering, 2(9), 3095-3099. https://europub.co.uk/articles/-A-139753