A Secure Routing Protocol for Mitigating Adversary Nodes in Mobile Ad-Hoc Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
The secure routing of MANETs(mobile ad-hoc networks) is still problem in now a day. In this project, a secure routing protocol design for new approach. The existing system says that allowing only legitimate nodes to participate in the bootstrapping process and trying to detect adversary nodes after they are participate in the routing protocol. It does not need secrete channel for route setup. It does not need flooding to setup initial routing. The proposing of existing system, maintain the routes properly in network and detect the adversary nodes whenever enter into network. Here we extend the routes for secure communication from legitimate nodes to controller. We use end to end secure communication protocol and prolonging network lifetime.
Authors and Affiliations
Mohammed Adil Adnan, Jaganmohana Rao Malla
Sludge Treatment System
sets of environmental scientists from all leading countries have predicted that the sources of sweet water are losing their strongholds and are expected to deploy overtime. It is also known that with increase of demand...
Review: Electro Rheology for Smart Automotive Suspension by Using Zeolite Base ERR Fluid
the purpose of the paper reported was to substantiate the capability of electro rheological (er) technology for adaptive control of suspension forces on wheeled vehicles. The shear strength properties of er fluid are pr...
Intelligent Control Systems for Physically Disabled and Elderly People for Indoor Navigation
The needs of many individuals with disabilities can be satisfied with traditional manual or powered wheelchairs, a segment of the disabled community finds it difficult or impossible to use wheelchairs. There is extensiv...
Achieving High Data Rates with Diversity Techniques in LTE
Orthogonal Frequency Division Multiple Access (OFDMA) is a technology for higher date rates in next generation of wireless communication standards. Efficient diversity in frequency selective channels improves data rates...
Secret Image Sharing Using Quick-Response Code Generation Technique
Patent safety and verification have become increasingly more important in regular life. The digital watermark is one of the methods invented to handle this problem. In this paper, a digitally invisible watermark is inse...