Mobile Ad Hoc Networks Authentication Using Npv Method

Abstract

NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Such a situation is of particular interest since it leaves the door open for adversarial nodes to misuse or disturb the location-based services. We deal with the open issue by suggesting a completely circulated cooperative solution that is robust against independent and colluding adversaries and can be weaken only by an overwhelming presence of adversaries.

Authors and Affiliations

Sri. M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, S. Geetha| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India

Keywords

Related Articles

A software fault prediction is a demonstrated strategy in accomplishing high software unwavering quality. Prediction of fault-inclined modules gives one approach to help software quality designing through enhanced bo...

Study of Multi Layered Composite Shell With Shape Memory Alloy

The use of special composite materials has been continuously growing in recent years. Although many applications for composite materials include identified. general research is still being carried out in order to exp...

Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements

The controlled induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, the information on the rotor speed is extracted...

Medical Decision Support Using Machine Learning And Natural Language Processing

The Machine Learning (ML) field has got much attention among the researchers in almost many fields of science and engineering because of it its vast application. The common application areas are medical decision supp...

Secure Key Distribution And Data Sharing For Dynamic Groups In Cloud To Protect From Collusion Attack

Sharing group resource among cloud clients is a noteworthy issue, so cloud computing gives a economical and creative planning, Because of regular change of participation, sharing information in a multi-proprietor way...

Download PDF file
  • EP ID EP16378
  • DOI -
  • Views 334
  • Downloads 14

How To Cite

Sri. M. Vamsi Krishna, S. Geetha (2014). Mobile Ad Hoc Networks Authentication Using Npv Method. International Journal of Science Engineering and Advance Technology, 2(11), 725-728. https://europub.co.uk./articles/-A-16378