Filters








9,009 Hits in 5.8 sec

An efficient protocol for secure communication in Wireless Ad Hoc Networks
IJARCCE - Computer and Communication Engineering

S.MOTHIVENKATA MANOJ, DR. S. VASUNDRA
2014 IJARCCE  
To create impulsive wireless Ad Hoc networks which is used to exchange the initial data and the secret keys?  ...  This Ad Hoc network increases the performance of the system and provides the security in the wireless Ad Hoc networks.  ...  IDE and j's signature who is trusted user in network so by this protocol we can avoid the intruders in the network Figure 1 : 1 Wireless Ad Hoc Network  ... 
doi:10.17148/ijarcce.2014.31247 fatcat:63fdi2btrjfnji5nutrnbnhxeu

AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

Hadj Gharib, Kamel Belloulata
2014 Advances in Science and Technology Research Journal  
Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious  ...  In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET's, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources  ...  INTRODUCTION Background A mobile ad hoc network is formed by a population of wireless nodes without preexistent network infrastructure or central administration.  ... 
doi:10.12913/22998624.1105141 doaj:33c091d6baa84f63ae47a9069b2763ed fatcat:zlxfauplorbkpbyehxo63avpg4

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks [chapter]

Eunyoung Kang, Yongsoon Im, Ungmo Kim
2008 Lecture Notes in Computer Science  
Given these features, the costs of service discovery in mobile ad-hoc networks must be lower than those of service discovery in conventional fixed networks.  ...  In this paper, we design and evaluate a service discovery scheme to effectively discover services by using only local information in a mobile ad hoc network.  ...  Proposed Service Discovery Protocol This section describes cooperative neighbor caching of service information, the lower ID-based service discovery protocol, and cache management, for mobile ad-hoc networks  ... 
doi:10.1007/978-3-540-88140-7_2 fatcat:dxloatr6ubdx3btxnmtsd7mgdq

Authentication Based on Multilayer Clustering in Ad Hoc Networks

Keun-Ho Lee, Sang-Bum Han, Heyi-Sook Suh, Sang Keun Lee, Chong-Sun Hwang
2005 EURASIP Journal on Wireless Communications and Networking  
In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks.  ...  Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other  ...  ID-based public key exchange is weighted more than the RSA algorithm. An ID-based public key is suitable in a mobile ad hoc network.  ... 
doi:10.1155/wcn.2005.731 fatcat:2i6rrsrcyba5da4dayhddxlblu

Detection of Vampire Attack in Wireless Adhoc Network

Kalyani S Kumar
2016 IJARCCE  
Mobile ad-hoc network is an infrastructure-less network in which the routing operation play important role in route discovery between communicating nodes.  ...  It is found that Network performance improves as compared to the existing approaches.  ...  CONCLUSION AND FUTURE WORK The key objective of the proposed work is to discover an optimum solution for vampire attack in wireless ad-hoc networks.  ... 
doi:10.17148/ijarcce.2016.51219 fatcat:imqirxwwgracfptrfqjur566zi

Esaodv: Implementation And Design Of Secure And Efficient Aodv For Wsn

Mr. Ojashvi Shivwanshi, Mr. Rahul Patel, Miss Preetika Saxena
2016 Zenodo  
A number of different network technologies are now in these days developed using the ad hoc configuration of networks.  ...  On the other hand the network devices are suffers from the various security and performance issues due to their ad hoc configurations.  ...  The wireless systems can be classified in two categories statically and ad-hoc. In ad hoc wireless systems are mobile and changing topology is property of network.  ... 
doi:10.5281/zenodo.47043 fatcat:5gz3bkwmxfbhhjmwl246b24yxi

Hierarchal Trust Certificate Distribution using Distributed CA in MANET

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In the growing network generation of wireless systems, there is a necessity usage of deploying wireless network for usage of individual mobile users.  ...  When two ad hoc networks merge, we need a mechanisms for nodes originated from different networks to certify and authenticate each other.  ...  INTRODUCTION In Ad hoc Network, Ad hoc On-Demand Distance Vector (AODV) protocol category of re-active routing protocol and it gives better performance through the on demand connection establishment.  ... 
doi:10.35940/ijitee.j9560.0881019 fatcat:qxu4cd57bfdidfts2asol73d6y

A Survey: Security in Patient Data Communication using Cryptographic Algorithm

Prof. Dr. Kawitkar R. S., Nikita S. Karekar
2017 IJARCCE  
In this project we are considering as a base protocol. Here the practical approach to prevent the inside attacks in the healthcare applications from attackers.  ...  Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical scenarios, including healthcare applications, home patient monitoring, military.  ...  Mobile ad hoc networks (MANETs) have a security problem which receives the same problems that exist in managed, wireless networks.  ... 
doi:10.17148/ijarcce.2017.6649 fatcat:gvdwm6cpf5dydg65zqio7lm62a

Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

J.
2012 American Journal of Applied Sciences  
Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed.  ...  Similarly, trust plays a very important role in the intermediate node selection in ad hoc networks.  ...  Anonymous routing is a value-added technique used in mobile ad hoc networks for the purposes of security and privacy concerns.  ... 
doi:10.3844/ajassp.2012.1283.1289 fatcat:wt6hormfnfajrjs6eioaglzzpa

Review on Data Transmission using Dynamic Routing And Reverse Encryption Algorithm

Kaustubh Satput
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
In day to day life security has become major issues for data transmission over wired and wireless Network.  ...  Reverse Encryption Algorithm (REA)) improve the data security over network.  ...  for ad hoc mobile networks.  ... 
doi:10.17762/ijritcc2321-8169.1504143 fatcat:oxz5ijawo5cnnlrdu2u2nlwb2m

Cross-layer interactions and optimizations in wireless networks

Catherine Rosenberg
2005 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems - MSWiM '05  
R.; "Understanding the Key Performance Issues with MAC Protocols for Multi-hop Wireless Networks", accepted to Special Issue on MAC in Wireless Communications And Mobile Computing 27 MAC Protocols  ...  scheduling -Ad hoc networks: capacity Let's First Talk About MAC ♦Central to all multi-access wireless networks is the MAC protocol.  ... 
doi:10.1145/1089444.1089445 dblp:conf/mswim/Rosenberg05 fatcat:lfuil6p6rjg6reex7csf67vfwq

Securing DSR with mobile agents in wireless ad hoc networks

Ahmed Abosamra, Mohamed Hashem, Gamal Darwish
2011 Egyptian Informatics Journal  
Dynamic Source Routing (DSR) protocol is a popular routing protocol designed for use in wireless ad hoc networks.  ...  data, while, public keys are used for the exchange of symmetric keys between nodes.  ...  Designing ad hoc network routing protocols is a challenging task which makes securing ad hoc networks more and more challenging.  ... 
doi:10.1016/j.eij.2011.02.003 fatcat:5dg4z26pkbeshe4xc6t7zhff5u

A Reliable Multicast Routing Protocol for High-speed Mobile Ad Hoc Networks: R-ODMRP

Zhiming Xu, Yu Wang, Jingguo Zhu
2010 Journal of Software  
We set 60 mobile nodes, the Ad hoc networks,” Ad Hoc Networks, vol. 5, pp. 210–227, multicast source sends 10 packets per second.  ...  Routing Protocols for Ad Hoc Networks,” 9th heavier at first.  ... 
doi:10.4304/jsw.5.1.20-27 fatcat:b6hly4tbandlvd2z4l6uv5sedi

An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks

V. S. Janani, M. S. K. Manikandan
2019 Wireless personal communications  
A mobile ad-hoc network is a self configure network with dynamic infrastructure. The mobile network is self formed and self healing network.  ...  The major function of the cluster head is to manage the keys and share it with the nodes in the network. The key in a group of mobile nodes are managed by the group key management.  ...  Mobile Ad-Hoc Network: A mobile ad-hoc and DCE (Data Communication Equipment). network (MANET) is a continuously self-MANETs are a kind of Wireless ad-hoc network that configuring network without infrastructure  ... 
doi:10.1007/s11277-019-06125-3 fatcat:dq2pc75gsfffzosdyouhuihcje

KEAM- To Isolate and Prevent Selective Packet Drop Attack in MANET
english

Sagar Babubhai Patolia, Narendra Kumar Bagde
2015 International Journal of Innovative Research in Science, Engineering and Technology  
A Selective packet drop attack is notorious security problem in wireless Mobile Ad-Hoc network (MANET).  ...  A mobile Ad-Hoc network is wireless networks without any pre-existing infrastructure and centralizes control. They have self-organizing capabilities with mobile nodes.  ...  A mobile Ad-hoc network is distributed, self-configuring and self-administrating highly dynamic wireless environment.  ... 
doi:10.15680/ijirset.2015.0405050 fatcat:tjabe2epwfghfnyfts3bf55ugq
« Previous Showing results 1 — 15 out of 9,009 results