Routing security and data confidentiality for mobile ad hoc networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mechanical engineering crazy
Active In SP
**

Posts: 226
Joined: Jul 2009
#1
05-08-2009, 05:27 PM


Summary: A mobile ad hoc network (MANET) is a collection of mobile nodes that forms a provisional network dynamically without the aid of any predetermined infrastructure. The salient nature of ad hoc networks renders them vulnerable to numerous types of security attacks. The dynamic feature of ad hoc networks makes enforcement of security become an extremely challenging issue. The main problem of many proposed routing protocols for ad hoc networks is that these protocols have critical susceptibilities to security attacks. Effective operation of ad hoc networks depends on the maintenance of correct routing information of the network. Nevertheless, securing routing protocols without securing network transmissions is not enough. As a result, our major focuses are to secure the routing protocol and likewise to protect data transmission. In this paper, we present the secure routing protocol (SEROP), which achieves data confidentiality and secures the routing protocol for mobile ad hoc networks without demanding any unrealistic assumptions.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
sushmasagar161@gmail.com
Active In SP
**

Posts: 8
Joined: Oct 2010
#2
09-10-2010, 04:04 PM

Routing security and data confidentiality for mobile ad hoc networks
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Switching and Traffic Grooming in WDM Networks at java project topics 3 951 09-09-2016, 02:27 PM
Last Post: Dhanabhagya
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 794 01-04-2016, 04:08 PM
Last Post: mkaasees
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,009 21-10-2015, 01:52 PM
Last Post: Guest
  intel centrino mobile technology ppt jaseelati 0 272 05-01-2015, 04:49 PM
Last Post: jaseelati
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,748 09-12-2014, 09:25 PM
Last Post: Guest
  Data Hiding in Video using Least Bit Technique seminar tips 1 576 18-10-2014, 05:40 AM
Last Post: wayan sukadana
  data mining full report project report tiger 35 199,216 03-10-2014, 04:30 AM
Last Post: kwfEXGu
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Report project girl 4 1,853 18-09-2014, 03:49 PM
Last Post: Radhika.m
  SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY ppt project girl 5 2,503 10-06-2014, 11:39 AM
Last Post: java projects
  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks seminar flower 4 1,808 02-06-2014, 09:51 AM
Last Post: seminar project topic