Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 1-10 of 47 total results
A Encryption Based Dynamic and Secure Routing Protocol for ...
An Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad-hoc Networks [19] proposes an efficient key management mechanisms for enforcing confidentiality, integrity and authentication ...
 Security Challenges and Attacks in Dynamic Mobile Ad Hoc ...
For instance, most of the ad hoc routing protocols proposed for MANET assume that every mobile node in the ad hoc network is cooperative and not malicious [1, 5].
Trust-Based Secure Routing in Mobile Ad Hoc Network Using ...
Abstract. Routing in mobile ad hoc networks (MANETs) is a hectic challenge due to the dynamic nature of the network. The provisional communication links are assured due to the infrastructure-independent capability of MANET, but with no proper centralized monitoring process, which makes routing in MANETs with respect to the security and trust a major issue....
A Secure Data Dissemination in a DHT-Based Routing ...
Over the past decade, distributed hash table- (DHT-) based routing protocols have been adopted in wireless ad hoc networks (WANETs) to achieve scalability in the route discovery phase by avoiding the flooding mechanism. The security aspects of the routing protocols based on the DHT mechanism are crucial to address and have not been discussed in the existing literature....
Efficient identity-based security schemes for ad hoc ...
2.1. Ad hoc networks––vulnerabilities and possible attacks. Unlike conventional wireless networks the security threats to ad hoc networks extend even to the basic structure of the network, as routing information by the nodes can be misguiding. All nodes participating in the communication cannot be assumed to be fair....
 Security in mobile ad-hoc networks using soft encryption ...
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing Prayag Narula a, Sanjay Kumar Dhurandher a,*, Sudip Misra b, Isaac Woungang c a Division of Information Technology, Netaji Subhas Institute of Technology, University of Delhi, India b Department of Computer Science, Yale University, New Haven, CT, USA c Department of Computer Science, Ryerson University ......
An adaptive fuzzy logic based secure routing protocol in ...
An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks ... mobile ad hoc network are: • Dynamic topology. Since nodes in the network can move arbitrarily, the topology of the network also changes. ... authentication and encryption algorithm. The Security-Level of mobile hosts is not fully considered....
A more secure and scalable routing protocol for mobile ad ...
Recently, a few secure position‐based routing protocols have been proposed for ad hoc networks. Examples of these are Secure Position Aided Ad Hoc Routing 17, Anonymous On‐Demand Position‐based Routing in Mobile Ad Hoc Networks 9 and Secure Geographic Forwarding 18. However, they suffer from some problems such as single point of failure ......
 Design and Implementation of Trust-based Secure Routing ...
in literature [7]. A routing protocol that is based on securing the routing information from unauthorized users is further discussed by Nekkanti et al. [8]. A trust based framework to improve the security and robustness of ad hoc network routing protocols is further implemented by Meka et al. here, a source node selects more trusted...
 Security Enhancement of AODV Protocol for Mobile Ad hoc ...
Figure 1: Ad Hoc Network 2. AODV ROUTING PROTOCOL AODV is a most widely used protocol and it is based on distance vector routing protocol that has been specially build Security Enhancement of AODV Protocol for Mobile Ad hoc Network Ms Darshana Patel1, Ms Vandana Verma2 1,2RCEW, Jaipur, Rajasthan, India....
1 2 3 4 5
Pages
|