Secure Data-transmission in Mobile Ad-hoc Network with Verification of Neighbor Positions
نویسندگان
چکیده
Location perception has become a quality in mobile systems, where a wide range of set of rulesand applications require dataof the placeof the contributingnodes. In lackof a priori trustworthy nodes the discovery and confirmationof fellow citizen positions becomes mainly challenging in the occurrenceof adversaries directing at injuring the system. In this paper, we reportthis exposedissue by suggestinga fully spreadsharedsolution that is strong against autonomous and colluding adversaries, and can be damaged only by avastbeing there of adversaries. Index Terms -Unstructured-Network, Position verification, Chinese remainder theorem, CRT-Algorithm, Backtracking Algorithm.
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملSecuring MANET against Wormhole Attack using Neighbor Node Analysis
In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make...
متن کاملSecuring Physical and network layer using SNAuth-SPMAODV with DSSS for Mobile adhoc networks in Military Scenario
A mobile ad hoc network is an infrastructure less network, fast emerging today for deployment in variety of applications. During deployment, security emerges as a central requirement due to many attacks that affects the performance of the ad hoc networks. Particularly Denial of Service attack is one such severe attack against network and physical layer which is a challenging one to defend again...
متن کاملEnsure Data Transmission in Mobile Ad- Hoc Networks
In the existing faith management scheme, the faith model has two components: faith from direct observance and faith from indirect observance. With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of unsure conclusion when the full probability model can be defined. On the other hand, with indirect observance, also called secondhand in...
متن کاملVerification and Innovation of Neighbor Positions in MANETs
In this paper generally MANETs are self-configuring autonomous networks that do not need any central authority to control and coordinate the network. In this neighborhood discovery (ND) is the process of discovering the devices that are directly reachable for communication or in physical proximity. So it becomes a fundamental requirement and building block for various other applications. It is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014