Dissemination of Link State Information for Enhancing Security in Mobile Ad Hoc Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent changes in the links. It is essential to learn the position of the neighbors because there is increase in location-aware services. So, there is a chance that the malicious nodes are easily abused the process. The significant problem in mobile networks is correctness of node locations and also it is primarily challenging in the presence of adversaries. So, the neighbor position verification protocol is used to a fully distributed, a lightweight NPV procedure which allows each node to obtain the locations advertised by its neighbors and asses their truthfulness. Further to extend neighbor position verification protocols in the proactive model that need to each node constantly verify the position of its neighbors. So, we introduce a technique called secure link state updating which provides secure proactive topology discovery that is multiply useful for the network operation. This technique is vigorous against individual attackers, it is capable to adjust its capacity between local and network-wide topology discovery, and also operating in networks of frequently changing topology and membership nodes. Experimental results show that the proposed system is high efficiency in terms of security when compared to the existing system.
Authors and Affiliations
Chandrasekar P
Improved Energy Conscious Dynamic Source Routing (I-ECDSR) for Adhoc Networks
Abstract: Adhoc network is a collection of mobile devices that have a capability of organizing themselves into a temporary network. Efficient routing is one of the key challenges in Adhoc networks. In this paper, we prop...
lntrusion Detection System Using GA
Abstract: Intrusion detection has become an essential component of computer security in recent years so many technologies have been developed to protect our system or network from intruders such as antivirus, firew...
Enhancement of Data Hiding Capacity in Audio Steganography
Nowadays, a lot of applications are Internet-based and demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure...
Estimation of Arm Joint Angles from Surface Electromyography signals using Artificial Neural Networks
Vicon system is implemented in almost every motion analysis systems. It has many applications like robotics, gaming, virtual reality and animated movies. The motion and orientation plays an important role in th...
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...