2017
DOI: 10.5120/ijca2017914390
|View full text |Cite
|
Sign up to set email alerts
|

A Framework to improve the Network Security with Less Mobility in MANET

Abstract: Infrastructures less network is MANET which creates the temporary network. Performance and security are its two major issues. Due to its self organizing feature providing runtime network security is tedious task. So an efficient and strong model is required to setup so that various eavesdropping activity can be avoided. Key management is a vital part of security in Manet because the distribution of encryption keys in an authentication manner is a difficult task due to its dynamic nature. As every time nodes le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Location/Connectivity-based Clustering KCLC [42], KCMBC [42], DDVC [43],DDLC [43] Throughput reduces when the node number increases in the clusters.…”
Section: Cluster-based Routing Protocols In Manetsmentioning
confidence: 99%
“…Location/Connectivity-based Clustering KCLC [42], KCMBC [42], DDVC [43],DDLC [43] Throughput reduces when the node number increases in the clusters.…”
Section: Cluster-based Routing Protocols In Manetsmentioning
confidence: 99%
“…Kaur and Rao [25] implemented a key management scheme for improving the security of MANET with reduced mobility overhead. The main intentions of this work are as follows:…”
Section: Organizationmentioning
confidence: 99%
“…If minimum received power of n j be denoted as minRecv(j), then minimum required transmission power transP ower i (j) required by n i to send a packet to n j at time t, is formulated in (21). This formulation is as per Frii's transmission equation [33], [9].…”
Section: Transmission Power Optimizationmentioning
confidence: 99%
“…1. message type id(2 bits) 2. source id(log 2 N bits) 3. destination id(log 2 N bits) 4. sessionr id(log 2 T M bits) 5. packet sequence id (log 2 P AC bits) Therefore, additional number of bits required to represent a link-fail message compared to two ordinary data packets, is denoted as B add Linkf ail and defined in (33).…”
Section: Transmission Power Optimizationmentioning
confidence: 99%