Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Routing in Mobile Ad-Hoc Networks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources ( utilization of bandwidth ) in node causes losses and as well as anonymity, unobservability of communication is not provided. To detect misbehaviors and effective utilization of resources in trusted nodes the Percentage Based Trust management system, with bandwidth reservation technique is proposed, and for achieving privacy in MANETs the PPRP is proposed. In this paper the scheme called Percentage based Trust management system is defined to allow trustworthy intermediate nodes to participate in path construction with resource reservation technique to allow trusted nodes to select a path which has minimum cost, congestion and bandwidth. In reservation technique, if available bandwidth is greater than traffic jam bandwidth. Using rate monitoring and adjustment methodologies, rate control is performed for the overcrowded flows and then an Privacy Preserving routing Protocol (PPRP) is proposed to offer complete anonymity, unlinkability and unobservabilty for all types of packets. PPRP uses novel combination of group signature and Id based encryption techniques for route discovery. The simulation result shows that this paper achieves trustworthy path construction through intermediate nodes with resource allocation technique and stronger privacy protection is achieved than existing scheme like AODV. Keywords: R
Authors and Affiliations
Raghu. R , Gopinathan. B
Smart Human Resource Information System
Traditional office administration work is headache for office employee. Smart HRIS will provide user friendly working environment, the system can also be used in LAN that multiple desks operate on same data. Tradit...
Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application
The Internet services and different applications become vital part of every person’s life. Web services and applications have smoothened the way of users for the faster data access. To meet the user’s requirements for fa...
A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Cloud computing is the emerging technology and also it requires strong security when dealing with public cloud data. Cloud access control is one of the security requirements. The basic security requirements for cloud sto...
“Integrating Heterogeneous Data Sources Using XML”
Nowadays organizations not only are increasing the data volume, but also they have to work with a large variety of data sources with different types of data. The central problem of information sources integration r...
Enforcing Multi-user Security Policies in Cloud Computing
The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential...