Filters








8,292 Hits in 6.8 sec

A Comparative Analysis of Unicast, Multicast, Broadcast and Anycast Addressing Schemes Routing in MANETs

Shivraj Kaur, Kulwinder Singh, Yadvinder Singh
2016 International Journal of Computer Applications  
The efficient addressing schemes based routing mechanism in MANETs is a challenging issue due to the dynamic nature of network topologies and resource constraints.  ...  In this paper, we are giving a comparative analysis of these message addressing and transmission methods on the basis of different factors such as Time, Spectrum Efficiency, Privacy and Security.  ...  In MANET when unicasting approach used every node maintains the routing table. So the only problem occurs that how the routing table to be created and maintained in MANET [7] [1].  ... 
doi:10.5120/ijca2016908001 fatcat:fmdq6dk76fez3hazh3knvma3wa

Implementing Security Features in MANET Routing Protocols

Abhishek Vyas, Satheesh A.
2018 International Journal of Computer Network and Information Security  
Like the use of unique signature and the use of secured algorithmic approach to secure against the various network layer routing attacks in MANETs.  ...  To, secure the routing protocols in MANETs there are already a number of security features included in many of the unicast and multicast routing protocols.  ...  . [1]  In MANETs, numerous layers are susceptible to attack, for example, MiTM attack is a multilayer attack.  An intelligent approach for a comprehensive security of MANET has not yet been discovered  ... 
doi:10.5815/ijcnis.2018.08.06 fatcat:okmohbwicjfyljh5tofzkngswy

An intelligent scheme of secure routing for mobile Ad Hoc networks

Zhongwei Zhang
2008 2008 2nd International Conference on Signal Processing and Communication Systems  
Security and routing on the wired networks have been treated separately due to that Security is concerned with how to defend nodes from hackers attack, while routing is about how to efficiently determine  ...  Towards a solution of secure routing on MANETs, we discuss a new scheme, which is reliant on the fuzzy logic, capable of determining the most secure route during the routing discovery in this paper.  ...  Routing algorithms include DSR [2] , AODV [1] , and SAODV [7] . A. Efficient routing protocols for MANETs In this section, we review an efficient routing protocol for MANETs.  ... 
doi:10.1109/icspcs.2008.4813739 fatcat:taur4gqtrjgq7fhpdg3wpltw4y

Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet

Selvi E, Shashidhara M. S
2017 International Journal of Communication Networks and Information Security  
in an efficient manner.  ...  In order to improve the secured data communication an efficient Quantum Phase Shift Energy Conserved Data Security (QPSEC-DS) technique is introduced.  ...  Therefore, security is considered to be an important factor for packet forwarding and routing in MANET.  ... 
dblp:journals/ijcnis/ES17 fatcat:6mwrwmyofrdrji6owr5lmlazjy

TRUST BASED MULTI PATH ROUTING & TOPOLOGY HIDING IN MOBILE AD HOC NETWORK : A SECURE PERSPECTIVE

Rahul K Ambekar
2017 International Journal of Advanced Research in Computer Science  
Trust based aapproach is used to secure communication using the trust between the neighbours . Trust based approach is an alternative to cryptographic tecniques .  ...  This paper evaluates variois trust based protocols and provide a direction to integrate trust based approach with topology hiding multi path routing protocols in MANET to provide optimal data transmission  ...  In this paper we have proposed two level security approach integrating topology hiding & trust based routing using multi path routing in Manet.  ... 
doi:10.26483/ijarcs.v8i7.4297 fatcat:qgw3osgx35dstkvoryqyc5ilum

Energy Preserving Secured Route Selection Algorithm Based on Hybrid Metaheuristic Algorithms for MANET

Kokila Surampatti, Bharathiar University, Brindha Lakshmanan, Queen Mary's college
2019 International Journal of Intelligent Engineering and Systems  
Hence, the energy efficient routing is an evergreen research topic for MANET. Additionally, the energy efficient routing algorithm must be as lightweight as possible to conserve the energy.  ...  Considering these points, this work aims to present an energy efficient, trustworthy route selection algorithm based on trust index.  ...  In [18] , an energy efficient and security based model for OLSR routing protocol is proposed for MANET.  ... 
doi:10.22266/ijies2019.1231.12 fatcat:f2grepsw5rb7jlt6m6rhowy6dm

Energy efficient clustering and secure routing using reinforcement learning for three-dimensional mobile ad hoc networks

B. Muneeswari, M.S.K. Manikandan
2019 IET Communications  
Therefore, a special energy efficient and secure routing protocol is of great importance in MANETs.  ...  In MANET, energy efficiency and security have become serious problems due to no fixed infrastructure. Clustering is the best option to reduce the EC in MANET.  ...  [28] proposed an efficient and secure group key agreement protocol-MANET (GKAP-MANET) to improvise security in MANET. GKAP-MANET provides security against the known key attacks.  ... 
doi:10.1049/iet-com.2018.6150 fatcat:wx3g4zajivaoreypx6stjcz5iy

A TWO TIER APPROACH FOR PREVENTING BLACK HOLE ATTACK AND IMPROVING EFFICIENCY

Avinash Gada .
2015 International Journal of Research in Engineering and Technology  
One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives.  ...  Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent.  ...  A Novel approach for preventing Black-Hole Attack in MANETs A Black-Hole attack is a type of attack in MANET occurs due to the presence of malicious nodes, that falsely advertises the fake fresh route  ... 
doi:10.15623/ijret.2015.0404141 fatcat:b5upgmr5nva2hc3etf5bghetju

Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET

H. Ghayvat, S. Pandya, S. Shah, S. C. Mukhopadhyay, M. H. Yap, K. H. Wandra
2016 2016 10th International Conference on Sensing Technology (ICST)  
It is secured AODV approach which efficiently finds wormhole attack present in a MANET and Digital signature is used to prevent it.  ...  Wormhole, the attack is generated by tunnels creation and it results in complete disruption of routing paths on MANET. The proposed security approach is to detect and mitigate wormhole attack.  ...  Neighbor node analysis is an approach to providing a solution for secure transmission in MANET and to identify wormhole attack and removes wormhole link in MANET [7] .  ... 
doi:10.1109/icsenst.2016.7796286 fatcat:6vqivo4pjratpp4kyery6lj65a

Multi Objective ALO Based Energy Efficient and Secure Routing OLSR Protocol in MANET

Hamela Kanagasundaram, Mother Teresa Women's University, Kathirvel Ayyaswamy, MNM Jain Engineering College
2019 International Journal of Intelligent Engineering and Systems  
The routing protocol design with security and energy efficiency is a challenging task in mobile ad hoc network (MANET).  ...  To overcome this challenge, we propose an energy-efficient secured routing protocol. The objective of our work is to provide a secured routing protocol, which is energy efficient.  ...  To improve QoS routing for MANET a game theory approach with energy efficient zone based routing protocol.  ... 
doi:10.22266/ijies2019.0228.08 fatcat:2fgvxvboondonognga4hdtzgve

An Optimized AOMDV based Upon RERMR and AMDMM

Priyanka Misra, Taranjit Singh Aulakh
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
In the current research the enhancement of the secured MANET routing protocol is done.  ...  This problem is reduced in the proposed approach using an optimization technique which makes multiple paths to the packets that are sent to the destination.  ...  Encryption is quite an important parameter in the MANET. To make RERMR more secure 3d cryptography technique is implemented in it for secure transmission.  ... 
doi:10.23956/ijarcsse/v7i6/0120 fatcat:boy4cnnmrnhspp7srjb4iwnfra

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

Darren Hurley-Smith, Jodie Wetherall, Andrew Adekunle
2015 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)  
By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs.  ...  To support routing, broadcast updates and efficient MANET communication, a Virtual Closed Network (VCN) architecture is proposed.  ...  Future work will focus on mobile nodes with variable reliability to further analyse the effectiveness and efficiency of VPN and VCN approaches to secure MANET communication.  ... 
doi:10.1109/icitst.2015.7412128 dblp:conf/icitst/Hurley-SmithWA15 fatcat:owy6vzwhd5asnmvpxhdqlysnkm

Review on Anonymous Routing Protocol for High Anonymity Protection in MANETs
English

Namrata R. Borkar, Prof
2015 International Journal of Innovative Research in Computer and Communication Engineering  
Mobile Ad-Hoc Network (MANET) uses an anonymous routing protocol for security purpose.  ...  An anonymous communication method in MANETs is mostly classified into three type s reactive methods, proactive methods and anonymous routing technique.  ...  as an Anonymous Location based and Efficient Routing protocol (ALERT).  ... 
doi:10.15680/ijircce.2015.0303011 fatcat:lbzlqba5qng2bdr7qirjqfotb4

Securing Autonomous Networks through Virtual Closure

Darren Hurley-Smith, Jodie Wetherall, Andrew Adekunle
2016 International Journal of Intelligent Computing Research  
By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs.  ...  To support routing, broadcast updates and efficient MANET communication a Virtual Closed Network (VCN) architecture is proposed.  ...  SUPERMAN, the VCN approach used as an example in this paper, also protects routing, and forms a secure network environment prior to routing operations.  ... 
doi:10.20533/ijicr.2042.4655.2016.0085 fatcat:5bioiood65ehxpjgxzo45s67yi

A Novel Secure Routing Protocol for MANETs [chapter]

Zhongwei Zhang
2011 Mobile Ad-Hoc Networks: Protocol Design  
Efficient routing protocols for MANETs In this section, we review one efficient routing protocol for MANETs.  ...  Unfortunately, the security in the discovered routes was not seriously considered. AODV is an efficient routing protocol on MANETs which is necessary, but not good enough.  ...  A Novel Secure Routing Protocol for MANETs, Mobile Ad-Hoc Networks: Protocol Design, Prof.  ... 
doi:10.5772/13395 fatcat:5zmene6dtncwjpocj5txyhywya
« Previous Showing results 1 — 15 out of 8,292 results