Mobile Ad Hoc Networks Authentication Using Npv Method
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Such a situation is of particular interest since it leaves the door open for adversarial nodes to misuse or disturb the location-based services. We deal with the open issue by suggesting a completely circulated cooperative solution that is robust against independent and colluding adversaries and can be weaken only by an overwhelming presence of adversaries.
Authors and Affiliations
Sri. M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, S. Geetha| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India
A software fault prediction is a demonstrated strategy in accomplishing high software unwavering quality. Prediction of fault-inclined modules gives one approach to help software quality designing through enhanced bo...
Study of Multi Layered Composite Shell With Shape Memory Alloy
The use of special composite materials has been continuously growing in recent years. Although many applications for composite materials include identified. general research is still being carried out in order to exp...
Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements
The controlled induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, the information on the rotor speed is extracted...
Medical Decision Support Using Machine Learning And Natural Language Processing
The Machine Learning (ML) field has got much attention among the researchers in almost many fields of science and engineering because of it its vast application. The common application areas are medical decision supp...
Secure Key Distribution And Data Sharing For Dynamic Groups In Cloud To Protect From Collusion Attack
Sharing group resource among cloud clients is a noteworthy issue, so cloud computing gives a economical and creative planning, Because of regular change of participation, sharing information in a multi-proprietor way...