High Throughput Analysis Using Topological Control & Authentication Scheme in MANET

نویسنده

  • R. Bharathi
چکیده

Since MANETs are mainly composed of lightight devices with limited capabilities, efficiently manage security is crucial to reduce the performance degradation and resources consumption. In particular, mobile ad hoc networks (MANETs) based on cooperative communication (CC) present significant challenges to security issues, as well as issues of network performance and management. Thus the authentication and topology control issues are closely correlated in MANETs and they have significant impacts on throughput. While considering the spam attack in MANET with cooperative communication results low throughput in network. So the proposed Secure Adaptive Distributed Topology Control Algorithm aims at topology control and performs secure self-organization in four phases: (I) Antinode Detection, (II) Cluster Formation, (III) Key Distribution; and (IV) Key Renewal, to protect against malicious node attacks. Keywords—Cooperative communication (CC), mobile ad hoc networks (MANETs).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing Channel Bandwidth with Authentication in MANET Utility Function

Mobilead hoc networks (MANETs) based on cooperative communication (CC) present significant challenges to security issues. The performance of network also to be monitored for the network by achieving high authentication and topology control in MANET has a significant impact on the throughput. In this paper a novel approach has been proposed using Joint authentication and topology control (JATC) ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

Efficient Authentication based IP Configuration for MANETS using Elliptic Curve Digital Signature Algorithm

For connecting into the internet world IP configuration is an important requirement in Mobile Ad Hoc Network (MANET). Hence, before involving in any sort of communication each node inside MANET should be self-configured yielding maximum performance metrics. To attain this each end terminal within the MANET network should be configured with a unique IP address. There have been several existing I...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013