An Implementation on Detection of Trusted service provider in Mobile Ad-hoc Networks
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 11, Issue 2
Abstract
The mobile ad-hoc network consists of energy constraint devices called nodes communicating through radio signals forming a temporary network i.e. nodes are continuously switching from one network to another. To minimize the power consumption, we form the clusters with an elected cluster head (Service Provider) based on any cluster head selection strategy. As the topology of this network is time variant attributable to node mobility, nodes are continuously leaving and entering the clusters, automatically registering with the cluster head to become the member of the cluster. But, there can be a scenario where a new node wants to access a service provided by the cluster head, at this time the newly entered node is unaware of the trustworthiness of the cluster head. To establish a trusted link amongst newly entered node and CH we have adopted an indirect trust computation technique based on recommendations, which form an important component in trust-based access control models for pervasive environment. It can provide the new node the confidence to interact with unknown service provider or CH to establish a trusted link for reliable accessibility of the service. In this paper, we shall present some existing indirect trust based techniques and subsequently discuss our proposal along with its merits and future scope.
Authors and Affiliations
Mr. Rahul A Jichkar , Dr. M. B. Chandak
The Evaluation of Forecasting Methods for Sales of Sterilized Flavoured Milk in Chhattisgarh
In recent years, there has been a great deal of discussion on applications of various forecasting models and their performance in forecasting business activities. This paper discussed few of forecasting models and their...
A Brief View of Model Based Systems Engineering Methodologies
The goal of this paper is to provide a brief view on Model Based Systems Engineering (MBSE) Methodologies that may be useful to systems engineers in understanding to engineer the complex, large and interdiscipl...
Face Recognition using LBP Coefficient Vectors with SVM Classifier
The development of automatic visual control system is a very important research topic in computer vision. In many application including texture based, face recognition system, in this paper we analysis for the face recog...
Speed Control of Induction Motor using Cycloconverter
This method is used to control the speed of the induction motor .The speed control by this method is simple and can be made economical by using different methods to control the operation of cycloconverter which in...
Risk Management in Construction Projects
Risk is involved in every business and construction industry is no exception. Risk in terms of safety, economy and timely completion are more crucial for a project to be a successful one. Indian construction industry is...