Mobile Ad Hoc Networks Authentication Using Npv Method

Abstract

NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Such a situation is of particular interest since it leaves the door open for adversarial nodes to misuse or disturb the location-based services. We deal with the open issue by suggesting a completely circulated cooperative solution that is robust against independent and colluding adversaries and can be weaken only by an overwhelming presence of adversaries.

Authors and Affiliations

Sri. M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, S. Geetha| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India

Keywords

Related Articles

Bridge Construction for New Broad Guage Line

From the moment human started exploring he started to travel across the world after the world- war II due to the industrial revolution these became even intense to travel for overseas human used only ships but to tra...

Dispensing Iptv Amenities Through Simulation By Enhancing Cloud Possessions

Prenent we are having virtual technologies these are failure on quality of services.The development of IPTV service delivery through cloud services is of temporary interest in many applications such as failure findi...

A Clustering-Based Shifting Technique To Align Data Units In Web Data Bases

An increasing number of databases have become web available through HTML form based search interfaces. The data units return from the underlying database are repeatedly encoded into the result pages dynamically for h...

Enhanced performance of micro grid in islanded mode with multi level inverter

Micro grids frameworks are little scale power supply arranges that have neighborhood power era. Micro grids network got to be one of the key spot in examination on dispersed vitality frameworks. Micro grids are fit f...

We propose a safe information sharing plan for dynamic individuals. Initially, we propose a protected path for key conveyance with no safe correspondence channels, and the clients can safely get their private keys fr...

Download PDF file
  • EP ID EP16378
  • DOI -
  • Views 336
  • Downloads 14

How To Cite

Sri. M. Vamsi Krishna, S. Geetha (2014). Mobile Ad Hoc Networks Authentication Using Npv Method. International Journal of Science Engineering and Advance Technology, 2(11), 725-728. https://europub.co.uk/articles/-A-16378