Dissemination of Link State Information for Enhancing Security in Mobile Ad Hoc Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent changes in the links. It is essential to learn the position of the neighbors because there is increase in location-aware services. So, there is a chance that the malicious nodes are easily abused the process. The significant problem in mobile networks is correctness of node locations and also it is primarily challenging in the presence of adversaries. So, the neighbor position verification protocol is used to a fully distributed, a lightweight NPV procedure which allows each node to obtain the locations advertised by its neighbors and asses their truthfulness. Further to extend neighbor position verification protocols in the proactive model that need to each node constantly verify the position of its neighbors. So, we introduce a technique called secure link state updating which provides secure proactive topology discovery that is multiply useful for the network operation. This technique is vigorous against individual attackers, it is capable to adjust its capacity between local and network-wide topology discovery, and also operating in networks of frequently changing topology and membership nodes. Experimental results show that the proposed system is high efficiency in terms of security when compared to the existing system.
Authors and Affiliations
Chandrasekar P
Efficient design of feedforward network for pattern classification
A feedforward neural network is a computing device whose processing units (the nodes) are distributed in adjacent layers connected through unidirectional links (the weights).Feedforward networks are widely used...
Study on Face Recognition Algorithm
Biometrics authentication is started to be used worldwide since the security it provides is of greaterextends. Face recognition is an important method of such an authentication. Face recognition can be carried out by man...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-transmission
Abstract: With the next-generation cellular networks making a transition toward smaller cells, two-hop orthogonal frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory component in t...
Steiner Tree: approach applying for shortest path in selected network
This paper focus on approach for shortest path from source to destination in which an autonomous system for virtual private network, whose communicate with each other in a private area. For selecting a shorte...
Blind Signature Scheme Based On Elliptical CurveCryptography (ECC)
Abstract: Blind signature is a concept to ensure anonymity of e-coins. Untracebility and unlinkability are ttwomain properties of real coins and should also be mimicked electronicaly. A user has fulfill above two p...