Mobile Ad Hoc Networks Authentication Using Npv Method

Abstract

NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Such a situation is of particular interest since it leaves the door open for adversarial nodes to misuse or disturb the location-based services. We deal with the open issue by suggesting a completely circulated cooperative solution that is robust against independent and colluding adversaries and can be weaken only by an overwhelming presence of adversaries.

Authors and Affiliations

Sri. M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, S. Geetha| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India

Keywords

Related Articles

Explication Search Results From Huge Amount Of Published Data

The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexi...

To Achieve An Optimal Tradeoff Between P2p Overlay Maintenance And Video Sharing Efficiency In Osn’s

Video sharing has been a gradually more popular application in OSNs facilitating users to share their personal videos or interesting videos they found with their friends. However OSN’s additional progress is strict...

WEB TESTING: For the Expressive of Ability and Imminent Tendencies

Testing is an essential stride in planning and executing software in the distributed environment. Testing in the conveyed applications is troublesome, as well as an expensive strategy. This Research quickly talks abo...

CONVERGENCE OF ITERATIVE NEWTON’S METHOD FOR THE SOLUTION NUMERICAL EQUATIONS

this paper an Iterative Newton’s method for the solution of simple and multiple roots of an equation f(x)=0 is given and it is proved that this method has second order convergence.

A Novel System for Scalable Data Sharing in Cloud Storage using Key-Aggregate

Of late, rapid growth observed in the cloud technology. Data sharing is an essential functionality in cloud storage. In this paper, we show how to efficiently, securely and flexibly share data with others in cloud sto...

Download PDF file
  • EP ID EP16378
  • DOI -
  • Views 345
  • Downloads 14

How To Cite

Sri. M. Vamsi Krishna, S. Geetha (2014). Mobile Ad Hoc Networks Authentication Using Npv Method. International Journal of Science Engineering and Advance Technology, 2(11), 725-728. https://europub.co.uk/articles/-A-16378