Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2014, Vol 4, Issue 1
Abstract
In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to establish communication between nodes. Here source node will have to generate and store a key called KEY2 and destination node will have to generate and store a key called KEY1. When source node initiates communication with destination-node, source node will send a requestpacket to destination via shortest/less- cost path (PATH1) without any key mentioning in the packet. Now destination node will send the requested packet and KEY1 to source node via different path other than PATH1 (path of received packet). Source will send KEY2 to destination again through the same path (PATH2). In scenario-2, communication of each node is based on the neighbour node’s priority, here, priority-1 being the highest, hence it is highly recommended for communication and priority three is being the lowest and it is rarely recommended for the communication. Nodes in the network classified into 3 types, unknown node, neighbor’s known node, nonneighbors known node. Priority of nodes can be evaluated based on the security measures, energy level and other parameters of the node. It can also consider Trust Value (TV) of each node based on the duration spent in active efficient communication. With help of this strategy, we can achieve highly secured route discovery, which will help network to have smooth communication among its nodes.
Authors and Affiliations
Chandrakant N| Bangalore, Karnataka, India
Characterization of AF Relaying Systems to Analyze the Ceiling Properties in System Limitations
In recen times, it was shown that transceiver hardware impairments have a harmful impact on the performance of communiqué systems, especially for high-rate systems. The vast majority of technical contributions in the...
Analysis of Burst Assembly Modeling for Optical Burst Switched Network
In this paper, we have study the current state of the technology, the Optical burst Switched (OBS) network is the most practical in all-optical architecture. Here we define how Burst Assembly will carried out and also he...
Implementation of Electronic Voting Machine with Multiple Preferences and Priority
Traditional paper based voting procedure was very long and time-consuming process and very much prone to errors. Polling by Electronic Voting Machine (EVM) is a simple, safe and secure method that takes minimum of time....
Survey on Energy Efficiency in DSR/AODV Protocols in Wireless Network
The demand for high data-rate multimedia wireless communications has been growing rapidly. As standards are addressing higher capacity wireless links to meet increasing demands, device power consumption is also increasin...
Hazardous Gas Detection Robot in Coal Mines
There are many coal producing and consuming countries in the world. The most frequent problems that they face are basically the accidents that frequently occurred due to gas explosion, flood, breaking out of fire duri...