A survery on platform of secured routing algorithm
نویسندگان
چکیده
منابع مشابه
Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks
Ant colony based routing algorithms addresses the adaptation of the collective behaviors observed in natural ant colonies for routing in wireless sensor network WSNs, ant swarms usually collectively achieve adaptive, scalable, and robust optimized paths between the net and the source of food with little intelligence and capacities at each individual which is very suitable from WSNs perspective ...
متن کاملGSTP: Geographic Secured Two Phase Routing Using MD5 Algorithm
Secured Two Phase Geographic Greedy Forwarding (SecuTPGF) is a geographic greedy forwarding protocol for transmitting multimedia data stream in Wireless Multimedia Sensor Networks (WMSN) in a secure and reliable manner. Cryptographic and MAC authentication mechanisms are used to implement security for both node and message authentication. In this paper, a modified version of SecuTPGF, the GSTP ...
متن کاملPerformance Evaluation of Secured versus Non-Secured EIGRP Routing Protocol
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we ev...
متن کاملA secured Cryptographic Hashing Algorithm
Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string. The message digest calculated from this algorithm is propagated in the communication medium along with the origi...
متن کاملSecured Distance Vector Routing (SDVR)
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically shaping a provisional network devoid of the use of any existing network infrastructure or centralized management. In MANETs, security is the major challenge due to the dynamic topology which is because of the mobility of the nodes. In this paper, we propose to design and develop a secure methodology incorporate...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i2.26.12530