scispace - formally typeset
Search or ask a question
Author

Supriya Das

Bio: Supriya Das is an academic researcher from Galgotias University. The author has contributed to research in topics: Routing protocol & Hazy Sighted Link State Routing Protocol. The author has an hindex of 1, co-authored 1 publications receiving 1 citations.

Papers
More filters
Proceedings ArticleDOI
01 Apr 2016
TL;DR: The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network and previously proposed approaches that plays a major role for enhancing the performance of D SR routing protocol.
Abstract: Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile nodes can move randomly in a network without any centralized management system. As MANET is a wireless network, security is a major concern and different type of attacks can manipulate the data/info that are transmitted from the source node to destination node in the network. This paper presents the literature review of DSR routing protocol and previously proposed approaches that plays a major role for enhancing the performance of DSR routing protocol. The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network.

1 citations


Cited by
More filters
Book ChapterDOI
01 Jan 2018
TL;DR: A model for behavior mapping for Wormhole Attacker considering the unknown and uncertain behavior of a wormhole node is introduced and shows enhanced throughput and minimal overhead-latency with increasing number of wormhole nodes.
Abstract: Wormhole attack has received very less attention in the research community with respect to mobile ad hoc network (MANET). Majority of the security techniques are toward different forms of wireless network and less in MANET. Therefore, we introduce a model for behavior mapping for Wormhole Attacker considering the unknown and uncertain behavior of a wormhole node. The core idea is to find out the malicious node and statistically confirm if their communication behavior is very discrete from the normal node by formulating a novel strategic approach to construct effective decision. Our study outcome shows enhanced throughput and minimal overhead-latency with increasing number of wormhole node.