Volume- 2
Issue- 4
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Mrs. Pallavi Patil
As MANETS (Mobile Ad hoc Networks) is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. Security in Mobile Ad-Hoc Network is the most important aspect for the basic functionality of network. MOBILE Ad hoc Networks (MANETs) are wireless networks which are characterized by dynamic topologies and have no fixed infrastructure. As such detection of a good neighbor node is a necessity. In the routing protocol called Quality of Service Good Neighborhood Node Detection Algorithms (QOS-GNDA) author find the good node but if malicious node present in network and if it makes entry in routing path then it causes security threat to sensitive data so we find the new Enhanced Quality of service Good Neighbor Node detection technique .we use Enhanced Highly Secure Approach against Attacks on MANETs (EHSAM) to overcome the data tempering problem.
[1] Perkins Charles E., and Elizabeth M. Royer. "Ad-hoc ondemandDistance Vector Routing." Second IEEE Workshop on Mobile Computing Systems and Applications,Pp. 90-100. IEEE1999.
[2] Singh Umang, B. V. R. Reddy, and M. N. Hoda . "GNDA: Detecting Good Neighbor Nodes in Adhoc Routing Protocol." Second International Conference on Emerging Applications of Information Technology (EAIT), Pp. 235-238. IEEE 2011.
[3] T. Rajamohan Reddy, N. Sobharani. "Selective On-demand Protocol for Finding Reliable Nodes to form Stable Paths in ADHOC Networks."International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Pp-21-24, vol-1, no. 5, 2012
[4] Khatibi Sina, and Ruhollah Rohani. "Quorum-based Neighbor Discovery in Self-organized Cognitive MANET." 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), Pp. 2239-2243. IEEE 2010.
[5] Biradar Rajashekhar and Sunilkumar Manvi. "Channel Condition and Mobility Based Choice of Neighbor Node for Routing in MANET." International Conference on Advances in Computer Engineering (ACE), Pp. 74-78, IEEE, 2010.
[6] Wang Gang, Shining Wu, Guodong Wang, Beixing Deng, and Xing Li. "Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System." International Conference on ultra modern telecommunication, pp. 1-5. IEEE, 2009.
[7] Huang Yangcheng, Saleem Bhatti, and Soren-Aksel Sorensen. "Adaptive Neighbor Detection for Mobile Ad Hoc Networks." UCL department of Computer science,RN7:17.
[8] Sanchez Juan A., Pedro M. Ruiz, and Ivan Stojmenovic. "GMR: Geographic Multicast Routing for Wireless Sensor Networks." 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, vol. 1, Pp. 20-29. IEEE 2006.
[9] Moussa A. C., F. M. Kamel, D. Noureddine, and K. Maamar. "Integration of Dynamic Current Bandwidth Capacity Calculation for Existing AODV." International Conference on Information Technology and e-Services (ICITeS), Pp. 1-7, IEEE 2012.
[10] Narayanan Uma, and Arun Soman. "Bandwidth Efficient GNDA." IOSR Journal of Engineering (IOSRJEN) ,Vol. 3, Issue 6, Pp40-43 , 2013
[11]Pallavi Patil. “Good Neighbor Node Detection Technique In Manets Using QOSGNA”.International Journal of Innovative Research in Engineering & Management (IJIREM), ISSN: Volume-2, Issue-3, May 2015
[12] Obaidat, M.S.; Woungang, I.; Dhurandher, S.K.; Koo, V., "Preventing packet dropping and message tampering attacks on AODV-based Mobile Ad Hoc Networks," Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on , vol., no., pp.1,5, 14- 16May 2012.
[13]S. Mamatha and S. C. Sharma, “A highly secured approach against attacks in MANETs”, Intl. Journal of Computer Theory and Engineering, Vol. 2, No. 5, Oct. 2010.
Mrs. Arpana Morey Department of Computer Engineering Pillai’s College of Engineering and Technology
No. of Downloads: 6 | No. of Views: 847
Atharva Parai, Swapneel Deshpande, Arjun Iyer, Adwait Kumbhare, Shailesh Bendale.
December 2022 - Vol 9, Issue 6
Prof. Anil Hingmire , Nikita M. Chaudahri , Utkarsha P. Patil , Lalita S. Mahajan Computer Engineering Department,VCET, Vasai,Maharashtra India lmahajan14@gmai.
March 2016 - Vol 3, Issue 2
Pallavi Patil .
May 2015 - Vol 2, Issue 3