Authenticated Routing Protocol Based on Reputation System For Adhoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of the solution to the problem is ARAN – Authenticated routing protocol which is a secure protocol and provides Integrity, Availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses reputation based schemes that an be applied to ARAN to detect selfish node and improve the performance.
Authors and Affiliations
Preeti Nagrath , Ashish kumar , Shikha Bhardwaj
Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes communicating with each other using multi-hop wireless. One of the main challenges of MANET is the design of robust routing algorithms that adapt t...
Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images
This paper introduces a novel idea of Binary Pattern observation of column wise and Row wise Walsh transformed color images for feature vector generation. The density distribution of Sal, Cal components of Binary Pattern...
Automatic Clustering Approaches Based On Initial Seed Points
Since clustering is applied in many fields, a number of clustering techniques and algorithms have been proposed and are available in the literature. This paper proposes a novel approach to address the major problems in a...
Revisions & Altercations in the Administration of Assets for Mobile Grid Computing
This paper provides a discussion on the Mobile Grid concept, the revisions that this implies in the Grid technology and the altercations that have to be met in order to address the new computing paradigm, mainly focused...
Person Identification System Based on Electrocardiogram Signal Using LabVIEW
This paper presents a method to analyze electrocardiogram (ECG) signal, extract the features, for the real time human identification. Data were obtained from short-term Lead-I ECG records (only one lead) of forty student...