Mobile Ad Hoc Networks Authentication Using NPV Method.

Abstract

NPV (neighbour position verification) method is companionable with security architectures counting the ones that havebeen projected for vehicular networks whichsymbolize a likely deployment environment for NPV.Such a situation is of particular interest since it leaves thedoor open for adversarial nodes to misuse or disturb thelocation-based services.Wedeal withthe open issue by suggesting a completelycirculated cooperative solution that is robust against independent andcolluding adversaries and can be weaken only by an overwhelming presence of adversaries.

Authors and Affiliations

Koneru Sudhir, Rajesh Babu Nagineni

Keywords

Related Articles

Optical Internet Security: A new Time based threat identification and its prevention

Optical Internet (OI), which are driving the demand for increased transmission rates and bandwidth – hungry applications and its services using dedicated optical routers. To cater this huge bandwidth demand, Transmis...

After BI: What’s the Future Intelligence?

Traditional Business Intelligence (BI) approaches have fallen short in delivering the expected value and return on investment. High costs, lengthy implementations and increasing complexity have led to frustration and...

A Novel Protocol To Implement The Solution On Mobile And Desktop Machine For Location Based Queries

We put into practice an answer on a desktop machine and a mobile device to measure the competence of our protocol. We also bring in a safety replica and examine the safety in the circumstance of our protocol. At leng...

Survey on Different Data Hiding Techniques

Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...

http://www.ijrcct.org/index.php/ojs/article/download/170/137

Mobile ad hoc networks offer excellent perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic...

Download PDF file
  • EP ID EP28105
  • DOI -
  • Views 245
  • Downloads 0

How To Cite

Koneru Sudhir, Rajesh Babu Nagineni (2014). Mobile Ad Hoc Networks Authentication Using NPV Method.. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28105