Professional Documents
Culture Documents
INTRODUCTION
Page 1
2. RELATED WORKS
Researchers pay a much attention in ensures the
fundamental security of infrastructure less MANETs.
Due to the limited physical protection of nodes, the
dynamical topology changing, the vulnerability of
wireless link and the lack of infrastructure, it is difficult
to secure MANETs. In this section,
we
briefly
introduce the existing methods for certificate revocation.
3. PROPOSED WORK
Arboit et al in their work putsother mechanisms. It
allows the nodes in the network to vote together. The
nodes vote with variable weights is the major difference
from the Luo et al it ensuring the larger accuracy. By
using the reliability and trustworthiness of the node,
calculate the weight of anode, which derives from the
past behavior the node such as accusing other nodes and
Page 2
ID
Level
M-hop
Balance
Page 3
Page 4
CID
Positive vote
Negative vote
4. CONCLUSION
Fig6. Control packets
REFERENCES
[1] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang,
Security in Mobile Ad Hoc Networks: Challenges
Page 5
Algorithms
for
Hierarchical
Networks,IEEE/ACM Trans. Networking, vol. 15, no.
6, pp. 1478-1489, Dec. 2007.
[14] Dai Zhi-Feng,li Yuan-Xiang,HeGuo-Liang Tong
Ya-La
Shen
Xian-Jun,Uncertain
Data
Management for Wireless Sensor Networks
UsingRough Set Theory,2006 IEEE.
[15] Ye
Tian,MinSheng,
Jiandong
Li,
YanZhang,Junliang Yao and Di Tang,Energy
aware Dynamic Topology Control Algorithm
for wireless AdHoc Networks,2008 IEEE
Page 6