Redirigiendo al acceso original de articulo en 19 segundos...
ARTÍCULO
TITULO

A Key Exchange Approach for Proficient and Secure Routing in Mobile Adhoc Networks

L Raghavendar Raju    
C R K Reddy Reddy    

Resumen

Mobile ad hoc networks (MANETs) are collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from efficiency and security point of view. This paper presents a proficient and secure routing, based on asymmetric authentication using key exchange approach (KEA). The proposed mechanism ensures secure routing and quality of service in MANETs and minimizes the network overhead. The KEA mechanism can be effectively used to develop a new routing protocol for Mobile Adhoc Networks which will provide maximum security against all kinds of attacks. In this paper, KEA is compared with other secure routing protocols like EEACK, AODV, and ARIADANE, to evaluate the efficiency of KEA in Ad Hoc Networks. The empirical results shows that there is an increase of 20% packet delivery ratio and a reduction of 10% routing overhead.

 Artículos similares

       
 
Min-Joon Kim and Thi-Thu-Huong Le    
This study delves into the intricate relationship between fluctuations in the real exchange rate and the trade balance, situated within the framework of a ?two-country? trade theory model. Despite a wealth of prior research on the impact of exchange rate... ver más
Revista: Information

 
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer    
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio... ver más
Revista: Information

 
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más

 
Gabriel M. Carral, Jesús Liñares, Eduardo F. Mateo and Xesús Prieto-Blanco    
We analyze autocompensation possibilities in entanglement-based QKD protocols. In particular, we study the seminal BBM92 protocol and find that an autocompensating technique is possible, although with severe limitations. This prompts the introduction of ... ver más
Revista: Applied Sciences

 
Farah Nefzaoui, Mohamed Fethi Ben Hamouda, Paula Maria Carreira, José Manuel Marques and Hans G. M. Eggenkamp    
The key processes responsible for the rise in groundwater salinization in the Mio?Pliocene aquifer system of Sousse (Tunisia, eastern coastline) were identified through a multidisciplinary approach based on the use of geochemical, stable (2H, 13C, 18O an... ver más
Revista: Water