Title :
Secure enhancement scheme for detecting selfish nodes in MANET
Author :
Tamilarasi, M. ; Sundararajan, T.V.P.
Author_Institution :
Dept. of ECE, Bannari Amman Inst. of Technol., Sathyamangalam, India
Abstract :
Mobile Ad hoc Networks (MANETs) operates on basic underlying assumption where all participating nodes are fully collaborated in self-organizing functions. However, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others. The selfish nodes, also termed as misbehaving nodes, with an incentive to cooperate has been an active research area recently. In this paper consider 2ACK scheme, which can be simply add-on to any source routing protocol. Security is achieved through the use of cryptographic algorithms. In this work, we perform an analysis of the energy requirements of various cryptographic primitives with the intention of using this data as a foundation for devising energy-efficient security protocols also we measure on delay, packet delivery ratio and routing overhead to evaluate best security algorithm.
Keywords :
cryptographic protocols; mobile ad hoc networks; routing protocols; telecommunication security; 2ACK scheme; MANET; cryptographic algorithms; energy-efficient security protocols; misbehaving nodes; mobile ad hoc networks; packet delivery ratio; routing overhead; secure enhancement scheme; self-organizing functions; selfish node detection; source routing protocol; Algorithm design and analysis; Cryptography; Energy consumption; Mobile ad hoc networks; Routing; Routing protocols; Cryptographic algorithm; Dynamic Source routing; Mobile Ad Hoc Networks; routing misbehavior;
Conference_Titel :
Computing, Communication and Applications (ICCCA), 2012 International Conference on
Conference_Location :
Dindigul, Tamilnadu
Print_ISBN :
978-1-4673-0270-8
DOI :
10.1109/ICCCA.2012.6179133