JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing syst...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Springer, Cham
2017
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf http://irep.iium.edu.my/58190/ https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.58190 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.581902017-09-05T04:23:57Z http://irep.iium.edu.my/58190/ JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique. Springer, Cham 2017-08-23 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf Khan, Burhan Ul Islam and Zulkurnain, Nurul Fariza and Olanrewaju, Rashidah Funke and Nissar, Gousia and Baba, Asifa Mehraj and Lone, Sajad Ahmad (2017) JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016, 21st-22nd September 2016, London, United Kingdom. https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50 10.1007/978-3-319-56991-8_50 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering |
spellingShingle |
QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
description |
The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique. |
format |
Conference or Workshop Item |
author |
Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad |
author_facet |
Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad |
author_sort |
Khan, Burhan Ul Islam |
title |
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
title_short |
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
title_full |
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
title_fullStr |
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
title_full_unstemmed |
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
title_sort |
jir2ta: joint invocation of resource-based thresholding and trust-oriented authentication in mobile adhoc network |
publisher |
Springer, Cham |
publishDate |
2017 |
url |
http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf http://irep.iium.edu.my/58190/ https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50 |
_version_ |
1643615302636797952 |