[go: up one dir, main page]

Mandhare et al., 2018 - Google Patents

Performance analysis of trust-based routing protocol for MANET

Mandhare et al., 2018

View PDF
Document ID
4282878288255118212
Author
Mandhare A
Kadam S
Publication year
Publication venue
Computing, Communication and Signal Processing: Proceedings of ICCASP 2018

External Links

Snippet

Mobile Ad hoc network (MANET) is a self-motivated network. Nodes are freely moved anywhere inside the network. They can enter and depart the network at any instance. Due to loss of infrastructure in the network frequent link failures occurred. So the special classes of …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks

Similar Documents

Publication Publication Date Title
Haseeb et al. Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things
Alaya et al. Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks
Tamil Selvi et al. A novel algorithm for enhancement of energy efficient zone based routing protocol for MANET
Harold Robinson et al. MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks
Haseeb et al. Efficient and trusted autonomous vehicle routing protocol for 6G networks with computational intelligence
Gopala Krishnan et al. Energy and trust management framework for MANET using clustering algorithm
Lin et al. PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks
Alghamdi Convolutional technique for enhancing security in wireless sensor networks against malicious nodes
Sadakale et al. TAD‐HOC routing protocol for efficient VANET and infrastructure‐oriented communication network
Bala et al. An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
Tripathi et al. ReTrust: reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IoV)
Mandhare et al. Performance analysis of trust-based routing protocol for MANET
Jamaesha et al. A secure and efficient cluster based location aware routing protocol in MANET
Venu et al. Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks
Baumgartner et al. Resilient enhancements of routing protocols in MANET
Hemanand et al. FSSAM: a five stage security analysis model for detecting and preventing wormhole attack in mobile ad-hoc networks using adaptive atom search algorithm
Shanthi et al. Secure and efficient distance effect routing algorithm for mobility (se_dream) in manets
Bazeer Ahamed et al. Dynamic secure power management system in mobile wireless sensor network
Khalladi et al. A new efficient approach for detecting single and multiple black hole attacks
Saini et al. A trust-based secure hybrid framework for routing in WSN
Sahu et al. QoS-Aware Unicasting Hybrid Routing Protocol for MANETs
Pandey et al. An energy-efficient intrusion detection system for MANET
Suresh Babu et al. Efficient DNA-based cryptographic mechanism to defend and detect blackhole attack in MANETs
Singh et al. An improved mechanism to prevent blackhole attack in manet
Brindha et al. Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks