Secure Routing Using ASOR Protocol for MANETs
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 1
Abstract
Privacy protection is one of the critical issues in Mobile Adhoc Networks. To provide unobservability and unlinkability on the network was the major requirements. Although ,there was number of secure protocols available previously, still the mobile nodes are insecure and the requirements on the network was not completely satisfied. The risk of security attacks increases, if the distance between the node increases. In order to provide security, the QOS requirements have to be met. Onion routing and group signature are used in this paper to provide secure routing and broadcasting to find secure route for data transmission. Onion routing is used to record a discovered route and to provide intermediate node to modify the routing packets. Without disturbing the anonymity, Group signature is used for authentication.ASOR provides security regarding both inside and outside attacks.
Authors and Affiliations
KALAIMANI A , AMBIKA B , KOUSALYA S , SUBATHRA S R
A Survey Report On Software Aging and Rejuvenation studies in Virtualized Environment
Software aging is a phenomenon that occurs in a long running complex software system that tends to decrease in performance or increase in failure rate. This phenomenon lead to performance degradation and crash/hang failu...
Cloud Computing Business Advantages for IT Sector
Cloud computing is an efficacious technology to perform massive-scale and complex computing on the go. It terminates the need to maintain immoderate computing hardware, dedicated space, and software. This paper also expl...
GIS Based Analysis for Pit Positioning For Rain Water Harvesting
This paper concerns with preprocessing and analysis of proposed model of (RWH)Rain Water Harvesting,” Ground Level Water Harvesting” using open source QGIS (Quantum GIS) Software tool & Google Earth. Google Earth is...
A REVIEW PAPER ON SMS TEXT TO PLAIN ENGLISH TRANSLATION(Text Normalization)
Mobile technology as well as social networking technology plays an important role in communication across internet. A large amount of information is found in noisy contexts as texting and chat lingo have become increasin...
EQUALITY IN BETWEEN ITERATIVE SOFT DILATION AND ITERATIVE SOFT CLOSE IN MULTI SCALE ENVIRONMENT
In this paper, equality is established and discussed in between soft dilation and soft close in multi scale environment as well as in iterative environment. Soft erosion and soft dilation will exist for various threshold...