Revathi Venkataraman

Learn More
Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and(More)
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by(More)
This paper proposes a new method for replication of files within a mobile adhoc network based on the prediction of the drift of the mobile nodes. The main feature of mobile ad hoc network is the dynamic topology. That is the nodes in the network are in mobile. To facilitate file sharing in mobile networks the only technique is file replication. Shared files(More)
— The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior by initially attracting a(More)
Mobile ad-hoc network (MANET) is a self-deliberate data network, where all nodes behave like host or router. MANET is a collection of number of mobile nodes or devices that randomly generate a temporary network. Security is the fundamental requirement in MANET due to its behavior of changing topology, open medium and lack of centralized authentication. This(More)
In this paper, we apply a Vector AutoRegression (VAR) based trust model over the Backpressure Collection Protocol (BCP), a collection mechanism based on dynamic backpressure routing in Wireless Sensor Networks (WSN) and show that the VAR trust model is suited for resource constraint networks. The backpressure scheduling is known for being(More)
The concept of a customized Optimized Link State Routing (OLSR) protocol with focus on augmented security protecting a node against blackhole and flooding attacks launched by its neighbor nodes in the network by implementing a trust model is described in this paper. This trust model is a computational variable that dictates the behavior of the node to(More)
Data replication is one of the popular services or a technique introduced in Mobile Ad hoc Networks (MANETs) to increase data availability. It can be used to create copies of frequently used shared data and distribute them in appropriate nodes. In most time critical applications of MANET, data replication plays a vital role because in these applications,(More)