e-ISSN : 0975-4024 p-ISSN : 2319-8613   
CODEN : IJETIY    

International Journal of Engineering and Technology

Home
IJET Topics
Call for Papers 2021
Author Guidelines
Special Issue
Current Issue
Articles in Press
Archives
Editorial Board
Reviewer List
Publication Ethics and Malpractice statement
Authors Publication Ethics
Policy of screening for plagiarism
Open Access Statement
Terms and Conditions
Contact Us

ABSTRACT

ISSN: 0975-4024

Title : Efficient Node Cooperation and Security in MANET using Closeness Technique
Authors : Sathiyakumar C, K.Duraiswamy K
Keywords : MANET, Node Cooperation, Closeness Technique, Clustering, Self-Organization, Security
Issue Date : Apr - May 2014
Abstract :
By description, a mobile ad hoc network does not stay on any permanent infrastructure; in its place, all networking utilities (e.g., routing, mobility management, etc.) are accessed by the nodes themselves in a self-organizing manner. On the other hand, it is rigid to support cooperativeness among the nodes for their own restricted resources that require to be conserved. These scrupulous nodes which are also termed as selfish nodes decline to help other nodes in forwarding packets owing to the anxiety of having resource. Several researches design a new method that aims at attaining confidentiality of the location for an efficient communication. Thus, privacy appears from the mobile network and users gain control over the disclosure of their locations. In this work, we propose closeness mechanism accepted from the assumption of small-world event or also termed as degrees of separation to persuade cooperativeness among nodes in a trusted node’s community. This paper also provides some general idea on how to develop security on the trusted MANET community by adapting security features of trust. The simulation of the proposed Efficient Node Cooperation and Security [ENCS] in MANET work is done for varying topology, node size, attack type and intensity with different pause time settings and the performance evaluations are carried over in terms of node cooperativeness, clustering efficiency, communication overhead and compared with an existing secured key model.
Page(s) : 754-763
ISSN : 0975-4024
Source : Vol. 6, No.2