Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2014, Vol 4, Issue 1
Abstract
In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to establish communication between nodes. Here source node will have to generate and store a key called KEY2 and destination node will have to generate and store a key called KEY1. When source node initiates communication with destination-node, source node will send a requestpacket to destination via shortest/less- cost path (PATH1) without any key mentioning in the packet. Now destination node will send the requested packet and KEY1 to source node via different path other than PATH1 (path of received packet). Source will send KEY2 to destination again through the same path (PATH2). In scenario-2, communication of each node is based on the neighbour node’s priority, here, priority-1 being the highest, hence it is highly recommended for communication and priority three is being the lowest and it is rarely recommended for the communication. Nodes in the network classified into 3 types, unknown node, neighbor’s known node, nonneighbors known node. Priority of nodes can be evaluated based on the security measures, energy level and other parameters of the node. It can also consider Trust Value (TV) of each node based on the duration spent in active efficient communication. With help of this strategy, we can achieve highly secured route discovery, which will help network to have smooth communication among its nodes.
Authors and Affiliations
Chandrakant N| Bangalore, Karnataka, India
Performance Analysis of Modified SV-Model Based DWT-OFDM Diversity for UWB System
Any UWB system faces major challenges in achieving wide coverage without affecting the system performance. In recent generation communication system OFDM is used to cater for increased data rate of wireless medium wi...
Handoff Decision Using Fuzzy Logic
The handover or handoff process is of major importance within any cellular telecommunications network. The term handoff refers to the process of transferring an active call or data session from one cell in a cellular...
Low Power Single Phase Clock Multiband Flexible Divider Using Low Power Techniques
In this paper, a low-power single-phase clock multiband flexible divider for Bluetooth, Zigbee, and IEEE 802.15.4 and 802.11 a/b/g WLAN frequency synthesizers is proposed based on pulse-swallow topology and is implem...
Usage of Measures of Interestingness in Educational Data
With the growing amount of data a new field called data mining is emerging extremely quickly. Data mining tools which perform data analysis may uncover important data patterns, contributing greatly to business strategies...
Reversible Multiplier with Peres Gate and Full Adder
Low Power dissipation and smaller area are one of the important factors while designing multipliers for digital circuits. As multipliers used in digital circuits dissipate large amount of heat whenever there is a tran...