Transmission of secure data in Mobile Adhoc Networks

2016 ◽  
Vol 4 (1) ◽  
pp. 9-14 ◽  
Author(s):  
CM VELU ◽  
◽  
P. Venkateswara Rao ◽  
2019 ◽  
Vol 8 (3) ◽  
pp. 8707-8714

Ad hoc system is a self-sufficient accumulation of versatile hubs imparting over remote connections where the hub sweep speak with one another in brief way with no unified administration and in a unique topology that changes habitually. A pernicious hub can always report mistaken data to different hubs in the system, which can lead to entire system down. Security is the principle issue of the versatile adhoc organize, as a result of portable hubs conduct. The topology of MANET changes regularly because of hubs versatility, by this property recently hub effectively enters or exit from a specific territory. Hubs in MANET will speak with each elective hubs if and gave that every one of the hubs square measure inside the equivalent change. This appropriation of hubs makes MANET helpless against fluctuated assaults, parcel dropping assault or dark gap assault and replay are a portion of the potential assaults. It is extremely substantial to see and block. To keep from bundle dropping assault, location of misconduct joins and self important hubs assumes a vital job in MANETs. Within this paper, all of us experience the analysis about flexible ad-hoc program and work of sensitive registering within this system. Within our proposed function we use Dempster Shafer hypothesis with regard to computing the actual trust associated with hubs. this particular trust really worth fills within as an open up key from the hubs to ensure that at what ever point 1 hub transfers the pack to another centre it decode the package utilizing the open crucial this procedure safe our transmitting over the method. by utilizing this specific crypto strategy we foresee our system through detached approaches or through the use of trust confidence we find out noxious carry out of hubs


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2018 ◽  
Vol 12 (1) ◽  
pp. 15-22 ◽  
Author(s):  
T. Bhatia ◽  
A.K. Verma ◽  
G. Sharma ◽  
S. Bala

Author(s):  
Yusuf Durachman ◽  

Current advancements in cellular technologies and computing have provided the basis for the unparalleled exponential development of mobile networking and software availability and quality combined with multiple systems or network software. Using wireless technologies and mobile ad-hoc networks, such systems and technology interact and collect information. To achieve the Quality of Service (QoS) criteria, the growing concern in wireless network performance and the availability of mobile users would support a significant rise in wireless applications. Predicting the mobility of wireless users and systems performs an important role in the effective strategic decision making of wireless network bandwidth service providers. Furthermore, related to the defect-proneness, self-organization, and mobility aspect of such networks, new architecture problems occur. This paper proposes to predict and simulate the mobility of specific nodes on a mobile ad-hoc network, gradient boosting devices defined for the system will help. The proposed model not just to outperform previous mobility prediction models using simulated and real-world mobility instances, but provides better predictive accuracy by an enormous margin. The accuracy obtained helps the suggested mobility indicator in Mobile Adhoc Networks to increase the average level of performance.


2011 ◽  
Vol 3 (4) ◽  
pp. 208-227 ◽  
Author(s):  
Zohra Slimane ◽  
Abdelhafid Abdelmalek ◽  
Mohamed Feham ◽  
Abdelmalik Taleb Ahmed

Sign in / Sign up

Export Citation Format

Share Document