Mobile Ad Hoc Networks Authentication Using Npv Method

Abstract

NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Such a situation is of particular interest since it leaves the door open for adversarial nodes to misuse or disturb the location-based services. We deal with the open issue by suggesting a completely circulated cooperative solution that is robust against independent and colluding adversaries and can be weaken only by an overwhelming presence of adversaries.

Authors and Affiliations

Sri. M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, S. Geetha| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India

Keywords

Related Articles

Design of a Low Power High Speed Double Tail Comparator

The proposed level shifter circuit able with a wide info voltage extend. The circuit depends on a Double-Tail comparator, and has an unmistakable component in current era conspire by checking information and yield ra...

Embedded Wireless Data Transfer to Cloud for Agriculture Application based on GPRS

This application introduces the design of Wireless Data Transfer (WDT) based on ARM Cortext – A8 Processor and SIM300 GPRS Modem through which we could acquire the different real-time information. In other words, t...

To The Encrypted Sensed Data By Applying Digital Signatures To Message Packets Using SET-IBS and SETIBOOS

We recommend two protected and resourceful data Transmission(SET) protocols for CWSNs, called SET-IBS and SETIBOOS,by means of the IBS scheme and the IBOOS scheme, correspondingly. The key suggestion of both SET-IBS...

To Investigate Data Centre Performance and Quality of service in IaaS Cloud Computing Systems

Cloud record management is a major key problem due to the single and multi-clouds strategies that can be provide range from the VM placement to the federation with other clouds. Performance evaluation of Cloud Comput...

A Two Layer Secure Data Search with Bilinear Map and AES over Cloud

Multikeyword search over cloud is an interesting research issue in the field of knowledge and data engineering of cloud computing. Various researchers proposed various solutions to upload and process documents over c...

Download PDF file
  • EP ID EP16378
  • DOI -
  • Views 349
  • Downloads 14

How To Cite

Sri. M. Vamsi Krishna, S. Geetha (2014). Mobile Ad Hoc Networks Authentication Using Npv Method. International Journal of Science Engineering and Advance Technology, 2(11), 725-728. https://europub.co.uk/articles/-A-16378