Authenticated Routing Protocol Based on Reputation System For Adhoc Networks

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9

Abstract

Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of the solution to the problem is ARAN – Authenticated routing protocol which is a secure protocol and provides Integrity, Availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses reputation based schemes that an be applied to ARAN to detect selfish node and improve the performance.

Authors and Affiliations

Preeti Nagrath , Ashish kumar , Shikha Bhardwaj

Keywords

Related Articles

Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification

The phylogenomic classification of protein sequences attempts to categorize a given protein within the evolutionary context of the entire family. It involves mainly four steps: selection of homologous sequences, multiple...

Simulation of A Novel Scalable Group Key Management Protocol for Mobile Adhoc Networks

A Mobile Adhoc Network (MANET) is a collection of autonomous nodes that communicate with each other ,most frequently using a multi-hop wireless network. Secure and multicast group communication is an active area of resea...

An Integer Programming-based Local Search for Large-scale Maximal Covering Problems

Maximal covering problem (MCP) is classified as a linear integer optimization problem which can be effectively solved by integer programming technique. However, as the problem size grows, integer programming requires exc...

COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS

The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue si...

IMAGE SEGMENTATION BY USING EDGE DETECTION

In this paper, we present methods for edge segmentation of atellite images; we used seven techniques for this category; obel operator technique, Prewitt technique, Kiresh technique, Laplacian technique, Canny technique...

Download PDF file
  • EP ID EP139753
  • DOI -
  • Views 138
  • Downloads 0

How To Cite

Preeti Nagrath, Ashish kumar, Shikha Bhardwaj (2010). Authenticated Routing Protocol Based on Reputation System For Adhoc Networks. International Journal on Computer Science and Engineering, 2(9), 3095-3099. https://europub.co.uk/articles/-A-139753