3 research outputs found

    Trust Management Model Observation towards Security Enhancements and QoS in MANET's

    Get PDF
    ABSTRACT: Mobile Ad Hoc Network (MANETs) is a group of mobile nodes connected with wireless links. MANET has topology as the nodes are moving constantly form one position to another position. All the nodes must co-operate with each other in order to route the packets. Cooperating nodes must trust each other. In defining and managing trust in a army MANET, Therefore trust is vital sound which affects the performance of MANET. There are several protocols proposed based on the trust. Mobile Adhoc Network distress from security vulnerabilities because of its dynamic topology and open wireless medium. So there is a chance for malicious node to participate in the routing procedure and leads to the packet lose. In this paper, we develop a trust management scheme which enhances the security issues in Mobile Adhoc Network In the trust management scheme with trust value for each node will evaluate. The trust value calculated from two types of observation one is direct and another is indirect. Combining these two values we get a most accurate trust value then we evaluate the scheme under the circumstances of routing. By this process we can improve the security in Mobile Adhoc Network and increase the packet delivery ratio. This paper is a study trust model based protocols and it proposes some new techniques on trust model management ,security enhancement and QoS in MANETs

    Efficient Hierarchical Identity-Based Encryption for Mobile Ad Hoc Networks

    Get PDF

    Securing resource-constrained wireless ad hoc networks

    No full text
    The authors discuss a novel approach to addressing security issues and articulate why and how the ID- based cryptography can be effectively applied to address various security problems in the resource-constrained wireless networks. Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks
    corecore