• Nenhum resultado encontrado

Authentication of Secure Data Transmission In Wireless Routing

N/A
N/A
Protected

Academic year: 2016

Share "Authentication of Secure Data Transmission In Wireless Routing"

Copied!
4
0
0

Texto

Loading

Referências

Documentos relacionados

Monitoring of routing packets and forwarding packets are done using our previous work of Trust based packet forwarding scheme by punishing or rewarding the nodes with decreasing

In this paper, simulation based study of the impact of neighbor attack and black hole attack on AOMDV routing protocol by calculating the performance metrics such as packet

We demonstrated this by proposing a simulation based framework for on-demand source routing protocols that allows us to give a precise definition of routing security, to model the

Earlier on-demand routing protocols[3,4,5,6,7] were based on flooding the routing packets in all directions irrespective of the location of the destination node, resulting

 Data Centric Protocols: Sensor Protocol for information via negotiation like SPIN, COUGAR, Active query forwarding in sensor networks also called ACQUIRE, Sequential

These approaches vary from source routing approaches, where the entire path towards the destination is pre-computed by the data source, to the dynamic routing

The results are verified for the reactive routing protocols such as Dynamic Source Routing protocol (DSR) and Adhoc on demand distance vector routing protocol (AODV) and they

In Case 1, i,e., for high level of security ( sec_ level = 1), during routing process, the source and destination nodes separately verify the authenticity of all other nodes in