Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Routing in Mobile Ad-Hoc Networks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources ( utilization of bandwidth ) in node causes losses and as well as anonymity, unobservability of communication is not provided. To detect misbehaviors and effective utilization of resources in trusted nodes the Percentage Based Trust management system, with bandwidth reservation technique is proposed, and for achieving privacy in MANETs the PPRP is proposed. In this paper the scheme called Percentage based Trust management system is defined to allow trustworthy intermediate nodes to participate in path construction with resource reservation technique to allow trusted nodes to select a path which has minimum cost, congestion and bandwidth. In reservation technique, if available bandwidth is greater than traffic jam bandwidth. Using rate monitoring and adjustment methodologies, rate control is performed for the overcrowded flows and then an Privacy Preserving routing Protocol (PPRP) is proposed to offer complete anonymity, unlinkability and unobservabilty for all types of packets. PPRP uses novel combination of group signature and Id based encryption techniques for route discovery. The simulation result shows that this paper achieves trustworthy path construction through intermediate nodes with resource allocation technique and stronger privacy protection is achieved than existing scheme like AODV. Keywords: R
Authors and Affiliations
Raghu. R , Gopinathan. B
GA optimized SVD based signal detector for Cognitive radio Networks
This paper examines the implementation of the Genetic Algorithm (GA) optimized Singular Value Decomposition (SVD) method to detect the presence of wireless signal. We simulated the algorithm using common digital...
Data mining approach to evaluate the data lossless Data Compression algorithms
: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression r...
Design and Implementation of Arithmetic Unit for GF(2m )
In Abstract algebra, a Finite field or Galois field (so named in honor of Évariste Galois) is a field that contains only finitely many elements. Finite fields are important in number theory, Algebraic geometry, Gal...
Recursive Pseudo-Exhaustive Two-Pattern Generator
Pseudo-exhaustive pattern generators for built-in self-test (BIST) provide high fault coverage of detectable combinational faults with much fewer test vectors than exhaustive generation. In (n, k)-adjacent bit ps...
Study & Analysis of Web Content Mining Tools to Improve Techniques of Web Data Mining
Web content mining in normal parlance is to download information available on the websites. Such a process involves tremendous stress and time-taking. To augment such a process the software related to web content m...