Security Measures in Aodv for Ad Hoc Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one of the primary challenges to be met. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such traditional solutions inapplicable. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. In this paper We detail solution against security threat as impersonation specifically in AODV routing protocol that are widely used in MANET. Through this proposal we can identify such kind of threat in decentralized network.
Authors and Affiliations
Nidhi Gour
Role of Computers in Bioinformatics by Using Different Biological Datasets
Abstract: The amount and variety of data in natural sciences increases rapidly. Data abstraction, data manipulation and pattern discovery techniques are of great need in order to deal with such large quantities....
Integration of PDM and ERP systems within a unified information space of an enterprise
This article focuses on the research on the complex processes of joint integration of PDM and ERP systems. The relevance of introducing an integrated system within a single information space is justified. The main challe...
Support Vector Machine Based Sentiment Analysis Process for Twitter Streams
Abstract: Sentiment Research in twitter is quite tough due to its short length. Attendance of emoticons, slang words and misspellings in tweets compelled to have a preprocessing pace beforehand feature extraction. There...
Modulo Search Trees (Plain and Z-Overlapped)
Abstract: This paper exploits the modulo division operation to construct a tree which is termed as Modulo search tree with two versions out of which one is coined as Plain Modulo Search Tree and the other is termed...
Spam Detection using Natural Language Processing
Abstract: Spam mails can be referred as unsolicited bulk email. These messages are used to advertise products and services for phishing purposes or to lead recipients to malicious sites with unethical intentions. A...