High Throughput Analysis Using Topological Control & Authentication Scheme in MANET
نویسنده
چکیده
Since MANETs are mainly composed of lightight devices with limited capabilities, efficiently manage security is crucial to reduce the performance degradation and resources consumption. In particular, mobile ad hoc networks (MANETs) based on cooperative communication (CC) present significant challenges to security issues, as well as issues of network performance and management. Thus the authentication and topology control issues are closely correlated in MANETs and they have significant impacts on throughput. While considering the spam attack in MANET with cooperative communication results low throughput in network. So the proposed Secure Adaptive Distributed Topology Control Algorithm aims at topology control and performs secure self-organization in four phases: (I) Antinode Detection, (II) Cluster Formation, (III) Key Distribution; and (IV) Key Renewal, to protect against malicious node attacks. Keywords—Cooperative communication (CC), mobile ad hoc networks (MANETs).
منابع مشابه
Enhancing Channel Bandwidth with Authentication in MANET Utility Function
Mobilead hoc networks (MANETs) based on cooperative communication (CC) present significant challenges to security issues. The performance of network also to be monitored for the network by achieving high authentication and topology control in MANET has a significant impact on the throughput. In this paper a novel approach has been proposed using Joint authentication and topology control (JATC) ...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملEfficient Authentication based IP Configuration for MANETS using Elliptic Curve Digital Signature Algorithm
For connecting into the internet world IP configuration is an important requirement in Mobile Ad Hoc Network (MANET). Hence, before involving in any sort of communication each node inside MANET should be self-configured yielding maximum performance metrics. To attain this each end terminal within the MANET network should be configured with a unique IP address. There have been several existing I...
متن کامل