Secure Routing Using ASOR Protocol for MANETs
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 1
Abstract
Privacy protection is one of the critical issues in Mobile Adhoc Networks. To provide unobservability and unlinkability on the network was the major requirements. Although ,there was number of secure protocols available previously, still the mobile nodes are insecure and the requirements on the network was not completely satisfied. The risk of security attacks increases, if the distance between the node increases. In order to provide security, the QOS requirements have to be met. Onion routing and group signature are used in this paper to provide secure routing and broadcasting to find secure route for data transmission. Onion routing is used to record a discovered route and to provide intermediate node to modify the routing packets. Without disturbing the anonymity, Group signature is used for authentication.ASOR provides security regarding both inside and outside attacks.
Authors and Affiliations
KALAIMANI A , AMBIKA B , KOUSALYA S , SUBATHRA S R
Effect of Enhancing MAC layer Security and Power Saving Mode on Mobile Ad Hoc Network
Mobile Ad Hoc Network is the wireless network with no centralized monitoring system. The nodes are free to move anywhere in the network. These mobile nodes also act as routers and make the routes for any data transmissio...
Improving Geographical Data Finder Using Tokenize Approach from GIS Map API
This Paper presents a novel approach to geographical data finder by combining the tokenize algorithm. Improper correctness of Geo location data lapse performance of GIS based applications. In this work, Geo location data...
DYNAMIC ANALYSIS OF LOCATION TRACKING USING MICROADDRESS RECORDER
The Location Tracking can be considered as one of the most advanced, innovative and practical Location based Services. A place is very important entity to a user with a semantic meaning such as “You are at your Home”,” Y...
Linear Time Sorting Algorithm for Large Integer Data-set
Dealing with the data is the basic task of almost every computer application. When we want to manipulate data sets then it is always easy to do that with sorted data sets. Today’s computer applications are dealing with b...
Design of 2.4 GHz Oscillators In CMOS Technology
oscillators are essential components of RF circuits also the integral part of various electronic systems. An oscillator is an electronic device used for the purpose of generating a signal robust, high performance oscilla...