• Corpus ID: 32057355

DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network

@inproceedings{Khan2015DTASRDT,
  title={DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network},
  author={Burhan Ul Islam Khan and Rashidah Funke Olanrewaju and Asifa Baba and Roohie Naaz Mir and Sajad Ahmad Lone},
  year={2015}
}
The Mobile Adhoc Network ( MANET) is not only limited to the temporary rescue operations rather it has been conceptualized to be adopted into many civil society comfort and safety applications including a specific domain called Vehicular adhoc network( VANET). The self-configurability of MANET’s node is the root cause of vulnerability and security threats, thus there is a need of light weight protocols which can ensure optimal Quality of Service (QoS) in secure way of routing. This paper… 

Figures and Tables from this paper

Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks

TLDR
This study is an attempt to enhance the security in routing techniques of MANETs by overhauling the existing security system after its critical evaluation and a non-cryptographic method has been put forward that strengthens the process of authenticating nodes in MANets by taking into account two factors viz. trust and resource.

A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions

TLDR
The MANETs have been analysed from the security perspective, particularly the work performed in the node misbehaviour paradigm has been elaborated and an overview of the dynamic domain of MANets is provided.

Bayesian Signaling Game Based Efficient Security Model for MANETs

TLDR
A Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes is offered, and it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate.

International Journal of Recent Technology and Engineering (IJRTE)

TLDR
The experimental results show that the accuracy and F1-measure of the model that mixes existing sentiment dictionaries and therefore the self-developed military sentiment dictionary are better than the results from using existing sentiment dictionary only.

References

SHOWING 1-10 OF 10 REFERENCES

Security of Self-Organizing Networks: MANET, WSN, WMN, VANET

TLDR
Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles to highlight potential threats to network security.

Wireless Sensor and Ad Hoc Networks Under Diversified Network Scenarios

TLDR
Introduction to Wireless Communication and Organization of the Book Fundamental Principles of Mobile Ad Hoc Networks Scenario Based Performance Analysis of Various Routing Protocols in MANETs and Analysis of Wireless Sensor and Actor Network Scenario Simulation Based Analysis of IEEE 802.15.4.

Malicious Behaviour of Node and its Significant Security Techniques in MANET-A Review

TLDR
This paper discusses only the significant research work that has been introduced in the past for the purpose of mitigating security threats in MANET.

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS

Fadlullah, 2013. based cache replacement technique in mobile ad hoc Building Next-Generation Converged Networks: network, in Information Security, IET

  • Theory and Practice,
  • 2015

Enhanced enhancing the level of security and to compare it with OLSR for defense against DOS attack in ad hoc more number of conventional techniques

  • 2013

Security of Self - Organizing management scheme based on behavior feedback for Networks : MANET , WSN , WMN , VANET , CRC opportunistic networks

  • 2010

Network Security Cryptography in Mobile Ad-Hoc Networks, in IEEE Technologies: Design and Applications: Design and Communications

  • Surveys & Tutorials,
  • 2013

Hoc Networks: Current Status and Future Trends, A Lightweight Encryption Scheme for NetworkCRC Press

  • Coded Mobile Ad Hoc Networks,
  • 2012

Management Innovation and networks, in Information Security, IET

  • Information Technology, WIT Press,
  • 2014