Trust Worthy Architecture Implementation for Mobile Ad hoc Networks

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7

Abstract

A mobile ad hoc network is a wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. The wireless and distributed nature of mobile ad hoc networks poses greater challenges like security, mobility, scalability, reliability and other attributes of trust worthy communication. In this paper we implemented a framework for mobile ad hoc networks by checking the simulation for various service metrics of mobile ad hoc networks. This framework implementation also provides optimum quality of service metrics, while being readily adaptable to widely differing applications, different hardware and software providers and changing technologies..

Authors and Affiliations

D. Saravanan , R. M. Chandrasekaran , B. Vishnu Prabha , V. R. Sarma Dhulipala

Keywords

Related Articles

A Novel Architecture of Agent based Crawling for OAI Resources

Nowadays, most of the search engines are competing to index as much of the Surface Web as possible with leaving a lurch at the OAI content (pdf documents), which holds a huge amount of information than surface web. In th...

Quantum Teleportation circuit using Matlab and Mathematica

This Paper describes a basic Quantum Teleportation circuit using mat lab Qlib tool. Teleportation is a new and exciting field of future communication. We know that security in data communication is a major concern nowada...

PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY

Using smart cards, remote user authentication and key greement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it...

Design And Implementation of Reconfigurable Rijndael Encryption Algorithms For Reconfigurable Mobile Terminals

In any wireless communication security is crucial during data transmission. The encryption and decryption of data is the ajor role in the wireless communication for security of the data. ncryption algorithms are used t...

Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint

Typically, general job shop scheduling problems assume that working times of machines are equal, for instance eight hours a day. However, in real factories, these working times are different because the machines may have...

Download PDF file
  • EP ID EP139890
  • DOI -
  • Views 135
  • Downloads 0

How To Cite

D. Saravanan, R. M. Chandrasekaran, B. Vishnu Prabha, V. R. Sarma Dhulipala (2011). Trust Worthy Architecture Implementation for Mobile Ad hoc Networks. International Journal on Computer Science and Engineering, 3(7), 2601-2609. https://europub.co.uk/articles/-A-139890