The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2
Abstract
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link-layer security using the CBC-X mode of authentication and encryption. By simulation results, we show that the proposed MAC-layer security protocol achieves high packet delivery ratio while attaining low delay, high speed and overhead
Authors and Affiliations
Rajaram , Dr. S. Palaniswami
The efficiency of algorithms DATA MINING "Close + and Extraction of association rules" for indexation 2D/3D and Selection of characteristic views.
This paper presents a new classification and search method of 3D object features views. This method is an application of algorithms: Close+ for an object views classification purpose Algorithm for extracting asso...
MATLAB Simulation of Fuzzy Traffic Controller for Multilane Isolated Intersection
This paper presents a MATLAB simulation of fuzzy traffic ontroller for controlling traffic flow at multilane isolated ignalized intersection. The controller is developed based on the waiting time and vehicles queue le...
A Survey on Recent Security Trends using Quantum Cryptography
Cryptography is the science of keeping private information from unauthorized access of ensuring data integrity and uthentication, and it is the strongest tool for controlling against much kind of security threats. Role...
Common Framework For Unix Scripting Languages
With the thousands of commands available for the command line user to write own application based on some complex shell script or other script. The complexity implies more difficulties to make an efficient monitoring, ma...
A New Approach for Designing Cryptographic Systems based on Feistel Structure
Many Classical and modern cryptographic algorithms have been developed by the Cryptographers to facilitate data security operations. Classical ciphers are not being widely used because of limited key space. Public key cr...