Dissemination of Link State Information for Enhancing Security in Mobile Ad Hoc Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent changes in the links. It is essential to learn the position of the neighbors because there is increase in location-aware services. So, there is a chance that the malicious nodes are easily abused the process. The significant problem in mobile networks is correctness of node locations and also it is primarily challenging in the presence of adversaries. So, the neighbor position verification protocol is used to a fully distributed, a lightweight NPV procedure which allows each node to obtain the locations advertised by its neighbors and asses their truthfulness. Further to extend neighbor position verification protocols in the proactive model that need to each node constantly verify the position of its neighbors. So, we introduce a technique called secure link state updating which provides secure proactive topology discovery that is multiply useful for the network operation. This technique is vigorous against individual attackers, it is capable to adjust its capacity between local and network-wide topology discovery, and also operating in networks of frequently changing topology and membership nodes. Experimental results show that the proposed system is high efficiency in terms of security when compared to the existing system.
Authors and Affiliations
Chandrasekar P
Time Controlled Cloud Environment with Self destructing Datasystem (SeDas) for Data Confidentiality
Abstract: Popularization of cloud technology and day to day usage of mobile Internet has become verycommon in today’s fast moving world where people are subjected to post their personal information likeaccount numb...
Mean shift segmentation on Enhanced Color image
Abstract: This paper proposed the method of mean shift segmentation on Enhanced color image . Themethod applies the modified histogram equalization technique for enhancement of under illuminated colorimage and then...
Highly Confidential Security System
Abstract : In todays crazy busy life style it is not very uncommon for us all to be forgetful.We often fail to remember our passwords,mail ids,pancard numbers,passport details,study certificate numbers etc..,this...
Skew Detection based on Bounding Edge Approximation
Abstract: Any paper document when converted to electronic form through standard digitizing devices, like scanners, is subject to a small tilt or skew. With recent advances of hand-held devices such as cell-phones,...
A Survey of Network Security in Mobile Ad-Hoc Network
Abstract: This paper describes the concept of ad hoc networking and the security issues faced by giving its background and presenting some of the security challenges that are faced by the mobile ad hoc network. Ad hoc wi...