Trust and resource oriented communication scheme in mobile ad hoc networks
Attaining high security in mobile ad hoc networks (or MANETs) is the utmost concern in the present era of wireless ad-hoc communication and efforts are continuously being made by the researchers, in order to provide a feasible solution for the same. Impervious security has to be ensured in MANET...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Book Chapter |
Language: | English English |
Published: |
Springer
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/62114/1/62114_Trust%20and%20resource%20oriented%20communication.pdf http://irep.iium.edu.my/62114/7/62114_Trust%20and%20resource%20oriented%20communication%20scheme%20in%20mobile%20ad%20hoc%20networks_scopus.pdf http://irep.iium.edu.my/62114/ https://link.springer.com/chapter/10.1007%2F978-3-319-69266-1_20 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English |
Summary: | Attaining high security in mobile ad hoc networks (or MANETs) is
the utmost concern in the present era of wireless ad-hoc communication and
efforts are continuously being made by the researchers, in order to provide a
feasible solution for the same. Impervious security has to be ensured in
MANETs because of their involvement in transacting highly sensitive information.
However, it has been discerned that during the communication process,
the decentralized and dynamic nature of MANETs impedes the security of
mobile nodes. This study is an attempt to enhance the security in routing
techniques of MANETs by overhauling the existing security system after its
critical evaluation. It has been observed that the cryptographic techniques in use
prove to be inefficient or fail in some of the current scenarios. Therefore, a
non-cryptographic method has been put forward that strengthens the process of
authenticating nodes in MANETs by taking into account two factors viz. trust
and resource, unlike the conventional ones. On analyzing the performance with
respect to throughput, packet delivery ratio, end-to-end delay and computational
time, the proposed system proves to be better than the previous standard secure
routing scheme. |
---|