A Secure and Energy Efficient Approach in Adhoc Networking
نویسنده
چکیده
An Ad-Hoc network is collection of wireless mobile nodes forming a temporary network without the use of any established infrastructure or fixed centralized administration. In Ad-Hoc networks the communicating nodes do not depend on a fixed infrastructure, which sets a new challenge for the necessary security architecture which they apply. In such an environment, it is necessary for one mobile node to enlist the use of other nodes in forwarding a packet to the destination, due to the limited range of bandwidth and signals of each mobile node wireless transmission. Movement of the nodes results in a change in routing paths, which requires some secure mechanisms for determining new routing paths. The deployment of sensor networks in security and safely critical environments requires secure communication primitives. Sensor networks in hostile environment make it vulnerable to the battery power drainage attacks. It is impossible to replace or recharge the battery power of the sensor nodes. Among different types of security attacks, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. In this paper we present secure routing protocols in Ad-Hoc networks to overcome this type of attacks. Keywords— Ad-Hoc network, Routing, Power draining, Mobile nodes, Sensor nodes
منابع مشابه
Energy Efficient, Secure and Stable Routing Protocol for MANET
Mobile Adhoc Network (MANET) is characterized by mobile hosts, dynamic topology, multi-hop wireless connectivity and infrastructureless ad hoc environment. The adhoc environment is accessible to both legitimate network users and malicious attackers. Moreover, as the wireless links are highly error prone and can go down frequently due to mobility of nodes, therefore, energy efficient, secure and...
متن کاملPerformance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile ADHOC Networks
Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...
متن کاملModelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network
The proposed research work presents a novel approach of process oriented architecture for secure mobile commerce framework using uniquely designed hybrid mobile adhoc routing protocols using reactive and proactive type in real time test-bed. The research work discusses about deployment of mobile commerce which is one of the emerging trend in mobile applications with huge demands. Majority of th...
متن کاملPerformance Characteristics of Cluster -Based Multicast Key Distribution Scheme for Mobile Adhoc Networks
Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...
متن کاملOptimal Economic Operation and Battery Sizing for Microgrid Energy Management Systems Considering Demand Response
Microgrids (MGs) contain a diverse mix of energy resources to provide safe and secure power to the consumers. Batteries are utilized in MGs for further energy security assurance as well as cost minimization. In this paper, an efficient approach is introduced for simultaneous energy management and optimal battery sizing to accomplish economic MG operation. Also, demand response programs are empl...
متن کامل