ASRMalNets: Acknowledgement Based Secure Routing Scheme for Malicious MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: A m o b i l e ad hoc network is a wireless commu- nication network, where communicating nodes are notwithin direct transmission range of each other. Since the radio links between t h e nodes b r e a k frequently, routing is a key issue in MANETs. The wide distribution of nodes makes M A N E T s vulnerable to malicious attacks. Hence hugeresearches are going on in this area. Efficient routing always c o nf l i ct s with secure packet transmission. Both these issues are highly challenging in MANETs and should go by hand. The paper presents a technique to address this tradeoff. Malicious nodes interrupt t h e communication by dropping all the data packets. The paper is anAcknowledgment b a s e d Secure Routing Scheme in Malicious MANETs. According to this mechanism, the packetdelivery is ensured even in the presence of malicious nodes. The main objective o f this scheme is to achieve reliabledata delivery in a malicious network. Performance of the proposed s y s t e m is compared with the existing routingalgorithm AODV using Network Simulator. Index Terms—Malicious networks, reliability, Mobile Ad-hoc
Authors and Affiliations
Sreelakshmi S, , Preetha K G
Copyright protection scheme based on visual Cryptography: AReview
Abstract: Management of digital images via internet and e-business has witnessed tremendous growth in lastdecades, resulting in vulnerability to copyright infringement, Manipulation and attacks. This paper reviewss...
Dynamic and transparent seat allocation using QR Code in a Mobile Application
Abstract: Indian Railway is world’s largest human transport system which is currently dealing with a lot of problems, such as availability of confirming seat to waiting list passengers after its departure. Moreover, ther...
Design and Implementation of Thresholding Algorithm based on MFR for Retinal Fundus Images
Abstract: In this paper, the entropy of maximum filter response (MFR) is applied followed by normalization and thresholding for retinal fundus image is used. The performance of our proposed method has been assessed on 23...
Managing IoT data using relational schema and JSON fields, a comparative study
Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections us...
A Parameter free Clustering of Density Based Algortihm
Clustering is a kind of unsupervised learning process in data mining and pattern recognition, most of the clustering algorithms are sensitive to their input parameters. So it is necessary to evaluate results of the clust...