JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network

The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing syst...

Full description

Saved in:
Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Zulkurnain, Nurul Fariza, Olanrewaju, Rashidah Funke, Nissar, Gousia, Baba, Asifa Mehraj, Lone, Sajad Ahmad
Format: Conference or Workshop Item
Language:English
Published: Springer, Cham 2017
Subjects:
Online Access:http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf
http://irep.iium.edu.my/58190/
https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.58190
record_format dspace
spelling my.iium.irep.581902017-09-05T04:23:57Z http://irep.iium.edu.my/58190/ JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique. Springer, Cham 2017-08-23 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf Khan, Burhan Ul Islam and Zulkurnain, Nurul Fariza and Olanrewaju, Rashidah Funke and Nissar, Gousia and Baba, Asifa Mehraj and Lone, Sajad Ahmad (2017) JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016, 21st-22nd September 2016, London, United Kingdom. https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50 10.1007/978-3-319-56991-8_50
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
T10.5 Communication of technical information
TK7885 Computer engineering
spellingShingle QA75 Electronic computers. Computer science
T10.5 Communication of technical information
TK7885 Computer engineering
Khan, Burhan Ul Islam
Zulkurnain, Nurul Fariza
Olanrewaju, Rashidah Funke
Nissar, Gousia
Baba, Asifa Mehraj
Lone, Sajad Ahmad
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
description The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique.
format Conference or Workshop Item
author Khan, Burhan Ul Islam
Zulkurnain, Nurul Fariza
Olanrewaju, Rashidah Funke
Nissar, Gousia
Baba, Asifa Mehraj
Lone, Sajad Ahmad
author_facet Khan, Burhan Ul Islam
Zulkurnain, Nurul Fariza
Olanrewaju, Rashidah Funke
Nissar, Gousia
Baba, Asifa Mehraj
Lone, Sajad Ahmad
author_sort Khan, Burhan Ul Islam
title JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_short JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_full JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_fullStr JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_full_unstemmed JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_sort jir2ta: joint invocation of resource-based thresholding and trust-oriented authentication in mobile adhoc network
publisher Springer, Cham
publishDate 2017
url http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf
http://irep.iium.edu.my/58190/
https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50
_version_ 1643615302636797952