Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks
Journal Title: Annals of Emerging Technologies in Computing - Year 2019, Vol 3, Issue 2
Abstract
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are considered in this study. In order to transmit the packets safely, a secured approach using triple factor has been proposed. This triple factor computes the trust by using the direct information then verifies the reputation by collecting the information from the neighbouring nodes called distributed factor and uses cryptographic algorithm to ensure security. And to ensure that there are routes available to perform the routing process, the reasons for such attacks are studied so as to re-integrate back the nodes in to the network, once it has repented for being malicious before. The availability of routes increases the throughput.
Authors and Affiliations
Mohammad Riyaz Belgaum, Shahrulniza Musa, Mazliham MohdSu’ud, Muhammad Alam, Safeeullah Soomro, Zainab Alansari
Cultural, Economic and Societal Impacts on Users’ Behaviour and Mobile Broadband Adoption Trends
The diverse range of Internet enabled devices both mobile and fixed has not only impacted the global economy but the very fabric of human communications and lifestyles. The ease of access and lowered cost has enabled hit...
Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the netw...
Models of Research and the Dissemination of Research Results: the Influences of E-Science, Open Access and Social Networking
In contrast with practice in recent times past, computational and data intensive processes are increasingly driving collaborative research in science and technology. Large amounts of data are being generated in experimen...
Towards a Quantum Field Theory for Optical Artificial Intelligence
Today, several socio-techno-economic drivers are steering the evolution of Telecommunications and Internet towards a growing exploitation of ultra-broadband infrastructures (e.g., 5G) and Artificial Intelligence (AI) sys...
An Investigation on Exhaustion of SAP ERP Users: Influence of Pace of Change and Technostress
Despite recent growing research interest on ERP research, the understanding on ERP induced exhaustion is still limited. This study examines how the pace of change of ERP functionalities and interface causes exhaustion in...