2017
DOI: 10.11591/ijece.v7i3.pp1197-1203
|View full text |Cite
|
Sign up to set email alerts
|

Node Disjoint Random and Optimal Path Selection (NDROPS) Algorithm for Security in MANETS

Abstract: Mobile Adhoc Networks are shortly called MANETs. In these types of networks, fixed infrastructures are absent and are dynamic in nature. Nodes are movable, and they are not connected with any wires. For monitoring or supervising the transmissions in MANETS, no central supervision is present. Moving nodes, dynamic topology, and absence of infrastructure are the features of MANETs. These features are advantageous where wires cannot be used and where nodes are supposed to move. But there is a problem of security.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 9 publications
(7 reference statements)
0
7
0
Order By: Relevance
“…This is achieved using Secure and Effective Random Paths Selection (SERPS) Algorithm to provide security in MANETs. The basic theme behind this algorithm is calculating node disjoint paths and then the minimum cost paths [22] among them. Then the routing is done through all the selected paths in random.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…This is achieved using Secure and Effective Random Paths Selection (SERPS) Algorithm to provide security in MANETs. The basic theme behind this algorithm is calculating node disjoint paths and then the minimum cost paths [22] among them. Then the routing is done through all the selected paths in random.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…In this section we provide the research survey of MANET security which has lead to the development of SERPS algorithm [8]. Shuchita et al [9] proposed a method of finding node and link disjoint paths to attain few positive qualities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…LITERATURE REVIEW 1. P Suma, O Nagaraju, MA Hussainet.al [1] In this author proposed an answer for averting mystery tuning in of information called listening stealthily and furthermore in decreasing the level of harm through various assaults like worm opening, dim gap assaults and numerous others. Furthermore, the primary favorable position is the accomplishment of security with slightest cost and least time for transmission.…”
Section: Existing Security Mechanisms Related To Selective Forwarmentioning
confidence: 99%
“…Sensor systems are powerless against various security attacks which can be either outside attack or inside attack [1]. Outside attacks are not exceptionally successful and do not make much harm to the system since they don't have the entrance to the system data.…”
Section: Introductionmentioning
confidence: 99%
“…source or target) or router (i.e. intermediate nodes) [2,3]. MANET is widely used in several applications like civilian, industrial, and military [4].…”
Section: Introductionmentioning
confidence: 99%