scispace - formally typeset
Journal ArticleDOI

FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems

Reads0
Chats0
TLDR
Friend based Ad hoc routing using Challenges to Establish Security (FACES) is an algorithm to provide secure routing in ad hoc mobile networks and provides an efficient approach towards security and easier detection of malicious nodes in the mobile ad hoc network.
Abstract
Friend based Ad hoc routing using Challenges to Establish Security (FACES) is an algorithm to provide secure routing in ad hoc mobile networks We propose this scheme that has been drawn from a network of friends in real life scenarios The algorithm works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place The nodes in the friend list are rated on the basis of the amount of data transmission they accomplish and their friendship with other nodes in the network The account of friendship of a node with other nodes in the network is obtained through the Share Your Friends process which is a periodic event in the network As a result of this scheme of operation, the network is able to effectively isolate the malicious nodes which are left with no role to play in the ad hoc network One major benefit of this scheme is that the nodes do not need to promiscuously listen to the traffic passing through their neighbors The information about the malicious nodes is gathered effectively by using Challenges This reduces the overhead on the network significantly Through extensive simulation analysis it was inferred that this scheme provides an efficient approach towards security and easier detection of malicious nodes in the mobile ad hoc network

read more

Citations
More filters
Journal ArticleDOI

Loop mediated isothermal amplification: An innovative gene amplification technique for animal diseases.

TL;DR: Loop mediated isothermal amplification assay is a rapid gene amplification technique that amplifies nucleic acid under an isothermal condition with a set of designed primers spanning eight distinct sequences of the target.
Journal ArticleDOI

A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems

TL;DR: A computational model for trust establishment based on a reputation mechanism, which incorporates direct SRRs' experiences and information disseminated from witness SRRs on the basis of their past experiences with SRPs, which exhibits good performance.
Book ChapterDOI

Advanced-Level Security in Network and Real-Time Applications Using Machine Learning Approaches

TL;DR: This chapter explores advanced-level security in network and real-time applications using machine learning.
Proceedings ArticleDOI

Towards Trusted and Efficient UAV-Based Communication

TL;DR: The requirements for efficient UAV communication are analyzed and the various trust-based protocols and management schemes that can be used in UAV networks and UAV applications where such protocols can be adopted are identified.
Book ChapterDOI

Security Approaches in Machine Learning for Satellite Communication

TL;DR: This chapter thrashes out in details and highlights on important technical issues during machine learning strategies in developing satellite communication systems.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.