Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 47 total results
Power Aware and Secure Dynamic Source Routing Protocol in ...
Mobile Ad Hoc Networks (MANETs) show better and valuable performance in the circumstances where the generally used wireless networks fail to work. In order to make routing in MANETs secure, number of security based routing protocols have been proposed in the literature but none of them is compliant with the MANETs environment....
 A Novel Approach of Secure Routing Protocol for Mobile Ad ...
Secure Routing Protocol for Mobile Ad Hoc Network by Imran Hossain Faruk, bearing roll number 211CS2069, is a record of an original research work carried out by him under my supervision and guidance in partial ful lment of the requirements for the award of the degree of Master of Technology in Computer Science and Engineering....
A Review of Current Routing Attacks in Mobile Ad Hoc Networks
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that ......
 Secure Approach for Location Aided Routing in Mobile Ad ...
security problem in the Ad hoc network routing protocol, and the corresponding security routing mechanism. Due to the importance of Ad hoc network in the communications, the future research should focus on the development of secure routing protocol for data transmission in the network....
Certificate Free Anonymous Routing for Mobile Ad Hoc Networks
This paper introduces a lightweight, anonymous, and secure routing protocol for mobile ad hoc networks. It leverages Identity Based Encryption (IBE) to provide a certificate-free key distribution mechanism. IBE is used only in the protocol’s critical initial stage, to exchange cryptographic key material for subsequent operations....
Applying puzzle encryption in the on-demand routing ...
This means that at every given time each node is equipped with its own hash-chain, a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance Vector (DSDV) routing protocol. On Demand Anonymous Routing in ad hoc networks ODAR (is proposed by Denh Sy, Rex Chen and Lichun Bao)....
Inclusive Survey of Various Trust based Dynamic Source ...
malicious nodes in mobile ad-hoc network trust based reactive routing protocol are typically used and consequently achieved results are far better. This paper surveys totally different trusted Dynamic source routing protocol, and it is analyzed that the dynamic source routing protocol performs better, whenever the...
Wireless ad hoc network - Wikipedia
A wireless ad hoc network (WANET) or Mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of ......
 Outsider Attack Prevention in Unobservable Secure On ...
Marcus Schöller, “Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs)” 4]. USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 5, MAY 2012 5]. Ad hoc network specific attacks held by Adam Burg. 6]....
 A Secure and Energy Enhanced Protocol for Routing in ...
A Secure and Energy Enhanced Protocol for Routing in Mobile Ad-Hoc Networks Deepthy Mathews, Shyama Sudarsan, S.Kannan and Dr.S.Karthik Abstract- Mobile Ad hoc Network (MANET) is a network composed of wireless mobile nodes such as PDAs and laptops in such a way that,...
1 2 3 4 5
Pages
|