Mobile Ad Hoc Networks Authentication Using NPV Method.

Abstract

NPV (neighbour position verification) method is companionable with security architectures counting the ones that havebeen projected for vehicular networks whichsymbolize a likely deployment environment for NPV.Such a situation is of particular interest since it leaves thedoor open for adversarial nodes to misuse or disturb thelocation-based services.Wedeal withthe open issue by suggesting a completelycirculated cooperative solution that is robust against independent andcolluding adversaries and can be weaken only by an overwhelming presence of adversaries.

Authors and Affiliations

Koneru Sudhir, Rajesh Babu Nagineni

Keywords

Related Articles

Vigorous Data Provision And Organization By Using Gossip Protocol

Cloud computing is focused on virtual mechanism data storage and sharing on web services. The cloud environment consists of several elements such as clients and distributions. It includes fault tolerance, high availa...

Finest Lag Broadcast for Multihop Wireless Associations Exhausting Self-Interference Termination

In Wireless Networks a large portion of wireless broadcast protocols show conventions vigorously depend on the MAC 802.11-based CSMA/CA Protocol. This Protocol will evades impedance and crash by moderate planning of...

VHDL Implementation of High Speed Fault Injection Tool for testing FPGA based designs

Fault injection is mainly used to test and evaluate the fault-tolerance based designs. In current VLSI technology fault injection has become a popular technique for experimentally determining dependability parameters...

Feedback Driven Load Profile for Software Applications

Running a Preproduction system load testing with a feedback from Production system is a vital for the strength of the Production system against Performance Failures. During Performance Testing Lifecycle in two importa...

High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications

The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any erro...

Download PDF file
  • EP ID EP28105
  • DOI -
  • Views 242
  • Downloads 0

How To Cite

Koneru Sudhir, Rajesh Babu Nagineni (2014). Mobile Ad Hoc Networks Authentication Using NPV Method.. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28105