The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2
Abstract
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link-layer security using the CBC-X mode of authentication and encryption. By simulation results, we show that the proposed MAC-layer security protocol achieves high packet delivery ratio while attaining low delay, high speed and overhead
Authors and Affiliations
Rajaram , Dr. S. Palaniswami
An Evident Theoretic Feature Selection Approach for Text Categorization
With the exponential growth of textual documents available in unstructured form on the Internet, feature selection approaches are increasingly significant for the preprocessing of textual documents for automatic text cat...
A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods
This paper proposes a data-hiding technique for water marked images and secured transmission of those watermarked images to the destination . today’s lot of companies are stored their data in the images, they store data...
Development of a vibration monitoring system for optimization of the electrical energy production
This article presents the development of a vibration monitoring system based on the method of spectral analysis at a strategic facility such as a feed pump in a thermal power plant and that the aim of optimizing the prod...
ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers
The k-nearest neighbor (k-NN) is one of the most popular algorithms used for classification in various fields of pattern recognition & data mining problems. In k-nearest neighbor classification, the result of a new i...
UEP based on Proximity Pilot Subcarriers with QAM in OFDM
A novel UEP (Unequal Error Protection) method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame along with QAM (Quadrature Amplitude Modulation) schemes. With...