Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks
Journal Title: Annals of Emerging Technologies in Computing - Year 2019, Vol 3, Issue 2
Abstract
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are considered in this study. In order to transmit the packets safely, a secured approach using triple factor has been proposed. This triple factor computes the trust by using the direct information then verifies the reputation by collecting the information from the neighbouring nodes called distributed factor and uses cryptographic algorithm to ensure security. And to ensure that there are routes available to perform the routing process, the reasons for such attacks are studied so as to re-integrate back the nodes in to the network, once it has repented for being malicious before. The availability of routes increases the throughput.
Authors and Affiliations
Mohammad Riyaz Belgaum, Shahrulniza Musa, Mazliham MohdSu’ud, Muhammad Alam, Safeeullah Soomro, Zainab Alansari
Big Data Analytics and Its Applications
The term, Big Data, has been authored to refer to the extensive heave of data that can't be managed by traditional data handling methods or techniques. The field of Big Data plays an indispensable role in various fields,...
The British Electronics and Computing Industries: Past, Present and Future
A brief review of key milestones in the development of the British Electronics and Computing industries is presented, together with some thoughts about future directions.
Ideal Node Enquiry Search Algorithm (INESH) in MANETS
The different routing protocols in Mobile Ad hoc Networks take after various methodologies to send the data starting from one node then onto the next. The nodes in the system are non-static and they move arbitrarily and...
Atomic Cross-chain Swaps: Development, Trajectory and Potential of Non-monetary Digital Token Swap Facilities
Since the introduction of Bitcoin in 2008, many other cryptocurrencies have been introduced and gained popularity. Lack of interoperability and scalability amongst these cryptocurrencies was - and still is - acting as a...
Sensor Networks Attacks Classifications and Mitigation
Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can be easily compromised. One of the main reasons for these vulnerabilities is the deployment nature, where sensor nodes are deployed without...