Downloads: 127 | Views: 271
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013 | Popularity: 6.4 / 10
Hybridization of Routing and Tolerant Security Mechanism for WANET
Gavendra Sahu, Neelabh Sao
Abstract: Wireless Ad hoc Network is a network where there is no existence of wireless infrastructure for networking. Thus this kind of network have limited homogenous feature. In sensor networks, building efficient and scalable protocols is a very challenging task due to the limited resources and the high scale and dynamics uses the GRA (Geographic Routing Algorithm) to get this location information. With the availability of GRA, the mobile hosts knows there physical location. One main challenge in design of these networks is their vulnerability to security attacks. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. We use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework. In this paper main focus is on time, location, power control and security. In order to support time, location, power control and security of critical applications, we present DFSRTS, (Depth First Search Based Routing-Tolerant Security Mechanism).
Keywords: DFS, GRA, greedy forwarding, LBK, ID based cryptography
Edition: Volume 2 Issue 1, January 2013
Pages: 109 - 113
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera