Authenticated Hierarchy Double Signature protocol for MANET (original) (raw)

Free PDF

A Novel Secure Routing Protocol in MANET Cover Page

Free PDF

A Comparative Study on Different Trust Based Routing Schemes in MANET Cover Page

A Review Paper on Cryptography Based Secured Advanced on Demand Routing Protocol in MANET's

Networks are being used in various areas of mobile ad-hoc network (MANET) used in network in Laptops, and smart phones. A mobile ad-hoc network (MANET) is a continuously self-configuring, infrastructure with less network of mobile devices connected with out wires .MANETs are a kind of wireless ad-hoc network that usually has a routable network environment MANET consists of a peer-to-peer, self-forming, healing network. In MANET several routing protocols are used AODV is the one among the routing protocols and it has the different characteristics because it has reactive routing Protocol and it overcomes the disadvantages of DSDV routing protocol. When the error message is sends back to Source and the procedure gets repeated, the failure of the link will degrade its characteristic .we are proposing a method when links or nodes fail to receive the data packets.RC6 is the cryptographic technique is used to secure the network

Free PDF

A Review Paper on Cryptography Based Secured Advanced on Demand Routing Protocol in MANET's Cover Page

Free PDF

Authenticated Reliable Routing Protocol for Mobile Ad hoc Networks Cover Page

Free PDF

Proposed Scheme for Secured Routing in MANET Cover Page

Free PDF

New Scheme for Secured Routing in MANET Cover Page

Free PDF

A trusted model using improved-AODV in MANETS with packet loss reduction mechanism Cover Page

Free PDF

Enhanced Secure Routing Model for MANET Cover Page

Free PDF

Performance Analysis of Malicious Node Aware Routing for MANET using TwoHop Authentication Cover Page

IJERT-An Efficient Secure Trust Based Adaptive Routing Misbehavior in MANET

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/an-efficient-secure-trust-based-adaptive-routing-misbehavior-in-manet https://www.ijert.org/research/an-efficient-secure-trust-based-adaptive-routing-misbehavior-in-manet-IJERTV3IS20887.pdf Ad hoc networks are widely used in military and other research areas. With nodes which can move randomly and connect to any nodes, it is impossible for ad hoc networks to own a fixed infrastructure. Routing is always the most significant part for any networks. During the lookup process of routing, no information is send back to originator, this result in fewer packets overhead. As per security concern, signature scheme is added in a routing process. Before sending the packet, source generates the signature with peer ID of destination and then forwards the packet to the IP address as per routing table. The packet will be decrypted only the system matched with the signature otherwise just forwards the packet to the next system. Then each node keeps the signed contact records of its earlier contacts, based on this the next contacted node can detect if the node has dropped any packet or not. Trust based Adaptive Routing algorithm is proposed from the tradeoff between trust degree and link delay. This algorithm is implemented based on AODV (Ad hoc On-demand Distance Vector) protocol and provides effective routing strategy combined with security signature scheme by considering the QoS parameters such as end-to-end delay, energy consumption, packet loss and packet delivery ratio.

Free PDF

IJERT-An Efficient Secure Trust Based Adaptive Routing Misbehavior in MANET Cover Page