Resource Aware Node Authentication Framework for Secure MANET
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: MANET comprises mobile nodes, which are links to each other by wireless connections without any base infrastructure. MANETs are vulnerable to security attack due to their features such as autonomous nature, infrastructure-less network and multi-hop communication. Therefore every node in MANET must be secure; node security can be provided by using node authentication techniques. Every node in MANET consists of resources such as battery power, bandwidth, and a memory to keep routing information. These resources provided by the MANET node are limited resources. A MANET faces various security attacks; one of them is flooding attack whose aim is to drain off limited resources of MANET node by continuously sending Route Request control Packet, false route information or fake data packets. The main goal of our approach is to provide resource aware node authentication framework to prevent flooding attack in MANET.
Authors and Affiliations
Komal Naik (Joshi), , Arati Dixit
Implementation of Ecc Using Socket Programming In Java.
Abstract: Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and developers as it has got robust mathematical structure and higher security compared to algorithms like RSA (Rivest Adleman...
Automatic test data generation for time-continuous embedded system using built-in signals
Nowadays, embedded systems are becoming critical applications and play important roles in modern society. Therefore, quality assurance for these types of systems has attracted many attentions in software engineering rese...
Design of ANN for prediction of operating performance Gas Sweetening Process used in Natural Gas Purification
Abstract: Gas sweetening unit is an essential industrial processthat exhibits significant non-linear behavior. It comprises of absorption and regeneration towers.Conventional linear control schemes based on rigorou...
Mine music
Abstract : This technical report describes the implementation details of a music recommendation system based on data mining techniques. The system enables the user to receive a playlist depending on his mood and ag...
Performance Evaluation of HTTP and DB Traffic Application Using Proactive and Reactive Routing Protocols
Abstract: A group of fixed or mobile communication devices that does not have a stable infrastructure to communicate with each other is known as mobile ad-hoc network. In MANET their is very importent role of nodes...