Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Multicast Conventions
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 4
Abstract
Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. We focus on the security problem of protecting the network connectivity between nodes in ad-hoc network. New nodes start to contribute in the network as guests; they can only become full members with a network signed certificate after their authenticity has been warranted by some other members. In this paper we introduce routine of multicast Protocol for tired authentication between the multilevel of ad-hoc network. In this proposed protocol Central Authority with trilateral authentication for managing key authentication and certification process which leads to increase the security and reliability of the network.
Authors and Affiliations
S Anjanaa
Multi-Resolution Pruning Based Co-Location Identification In Spatial Data
A co-location spatial pattern is a pattern of multiple groups which co-relates spatial features or events that are frequently located in same zone. Co-location pattern mining emphasizes overall analysis bymanipulating th...
Analysis and Implementation of Selective Image Encryption Technique Using Matlab
Abstract: Encryption plays a very significant role in secure transmission of digital images from one place to another. There are a number of encryption algorithms available which perform the task of encryption. How...
Moment Features Weighting for Image Retrieval
Abstract: Feature selection is an effective tool to improve the performance of content based image retrieval systems. This paper presents an effective moment weighting method according to image reconstruction and retriev...
Improve Performance by Using Load Balancing Algorithm to Reduce Response Time and Processing Time on Cloud Computing
Cloud computing is one of the incredible technology which enable the new vision for IT industry. Nowadays, it has become a strong alternative for startup large as well as small scale organizations that only use the resou...
Channel Fading Detection in Manets with Hand off Strategy
In wireless mobile ad hoc networks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc OnDemand Multipath D...