2018
DOI: 10.11591/ijece.v8i5.pp3267-3277
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Data Privacy Mechanism through Secure Session Key Exchange Model for MANET

Abstract: <p>Data privacy in the mobile ad-hoc network is a problem due to wireless medium, frequent node movement and lack of any centralized infrastructure support. In such case, it is very important to build a reliable and secure network and achieve high throughput in MANET. The reliability and security of a network depend on whether the network remains linked to different failures and malicious activities, which is the fundamental issue that needs to be focused when designing a secure routing protocol in MANET… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…the MPRs search procedure launched by the NPC (Node Performing the Computation) makes it possible to detect a set of nodes able to transmit its messages and its data to other nodes far from its range and therefore cover the entire network. The computation of the MPR by the standard algorithm RFC3626 [3] presented below remains basic and insufficient because it does not take into account all the characteristics of the node and the network, for a thorough study of this problem we compared several approaches proposed by researchers in order to improve the quality of service [4,5] and security level [6,7] of this protocol against attacks [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…the MPRs search procedure launched by the NPC (Node Performing the Computation) makes it possible to detect a set of nodes able to transmit its messages and its data to other nodes far from its range and therefore cover the entire network. The computation of the MPR by the standard algorithm RFC3626 [3] presented below remains basic and insufficient because it does not take into account all the characteristics of the node and the network, for a thorough study of this problem we compared several approaches proposed by researchers in order to improve the quality of service [4,5] and security level [6,7] of this protocol against attacks [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…There is various research works towards investigating the solutions for identifying the challenges in different forms of wireless network e.g. wireless local area network (WLAN) [2,3], wireless sensor network (WSN) [4,5], mobile adhoc network (MANET) [6,7], etc. Out of all forms of wireless network, WSN has got a significant future as it is an integral part of Internet-of-Things (IoT) as well as any cyber-physical system [6].…”
Section: Introductionmentioning
confidence: 99%