Revathi Venkataraman

Learn More
In this paper, we apply a Vector AutoRegression (VAR) based trust model over the Backpressure Collection Protocol (BCP), a collection mechanism based on dynamic backpressure routing in Wireless Sensor Networks (WSN) and show that the VAR trust model is suited for resource constraint networks. The backpressure scheduling is known for being(More)
Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and(More)
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by(More)
This paper proposes a new method for replication of files within a mobile adhoc network based on the prediction of the drift of the mobile nodes. The main feature of mobile ad hoc network is the dynamic topology. That is the nodes in the network are in mobile. To facilitate file sharing in mobile networks the only technique is file replication. Shared files(More)
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior by initially attracting a(More)
Data replication is one of the popular services or a technique introduced in Mobile Ad hoc Networks (MANETs) to increase data availability. It can be used to create copies of frequently used shared data and distribute them in appropriate nodes. In most time critical applications of MANET, data replication plays a vital role because in these applications,(More)
Mobile ad-hoc network (MANET) is a self-deliberate data network, where all nodes behave like host or router. MANET is a collection of number of mobile nodes or devices that randomly generate a temporary network. Security is the fundamental requirement in MANET due to its behavior of changing topology, open medium and lack of centralized authentication. This(More)
We have customized Ad hoc On demand Distance Vector (AODV) protocol and augmented security aspect in real time scenario using numeric step values called Trust assigned to finite number of neighbor nodes to evaluate network behavior, subsequently secure the network by barricading the network from malicious nodes in Blackhole and flooding attack modes.(More)