Hybridization of Routing and Tolerant Security Mechanism for WANET
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013

Hybridization of Routing and Tolerant Security Mechanism for WANET

Gavendra Sahu, Neelabh Sao

Wireless Ad hoc Network is a network where there is no existence of wireless infrastructure for networking. Thus this kind of network have limited homogenous feature. In sensor networks, building efficient and scalable protocols is a very challenging task due to the limited resources and the high scale and dynamics uses the GRA (Geographic Routing Algorithm) to get this location information. With the availability of GRA, the mobile hosts knows there physical location. One main challenge in design of these networks is their vulnerability to security attacks. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. We use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework. In this paper main focus is on time, location, power control and security. In order to support time, location, power control and security of critical applications, we present DFSRTS, (Depth First Search Based Routing-Tolerant Security Mechanism).

Keywords: DFS, GRA, greedy forwarding, LBK, ID based cryptography

Edition: Volume 2 Issue 1, January 2013

Pages: 109 - 113

Share this Article

How to Cite this Article?

Gavendra Sahu, Neelabh Sao, "Hybridization of Routing and Tolerant Security Mechanism for WANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010163, Volume 2 Issue 1, January 2013, 109 - 113

72 PDF Views | 59 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'DFS'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2768 - 2769

Distributed Data Storage and Retrieval on Cloud by using Hadoop

N. Brahmanaidu, Shaik Riaz

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2993 - 2996

Survey Paper on Load Rebalancing for Distributed File Systems in Clouds

Juhi Shah, D. N. Rewadkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1179 - 1184

Survey on Schedulers Optimization to Handle Multiple Jobs in Hadoop Cluster

Shivaraj B. G., Nagaraj Naik

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1290 - 1293

A Review on Need of MapReduce in Big Data Application

Sushant Shirish Nagavkar, Ashishkumar

Share this Article

Similar Articles with Keyword 'GRA'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Similar Articles with Keyword 'greedy forwarding'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1133 - 1136

Study of Greedy Forwarding Strategy in Under Water Wireless Sensor Networks

Girish Khorate, Urmila Biradar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 109 - 113

Hybridization of Routing and Tolerant Security Mechanism for WANET

Gavendra Sahu, Neelabh Sao

Share this Article
Top