Call for papers :

Submission Last Date 31/12/2017
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
Accomplishing MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Detection
Abstract
In this work, two situations are considered, situation 1 is key based correspondence and situation 2 is need based directing and correspondence. In situation 1, MANET chips away at created keys called KEY1 and KEY2 to set up correspondence between hubs. Here source hub should create and store a key called KEY2 and goal hub should produce and store a key called KEY1. At the point when source hub starts correspondence with goal hub, source hub will send a demand bundle to goal by means of most limited/less-cost path (PATH1) with no key saying in the parcel. Presently goal hub will send the asked for bundle and KEY1 to source hub by means of various path other than PATH1 (path of got parcel). Source will send KEY2 to goal again through a similar path (PATH2). In situation 2, correspondence of every hub depends on the neighbor hubs need, here, need 1 being the most elevated, thus it is very suggested for correspondence and need three is being the least and it is once in a while prescribed for the correspondence. Hubs in the network grouped into 3 sorts, obscure hub, neighbors known hub, non-neighbors known hub. Need of hubs can be assessed in view of the safety efforts, vitality level and different parameters of the hub. It can likewise consider Trust Value (TV) of every hub in view of the span spent in dynamic productive correspondence. With help of this procedure, we can accomplish exceptionally secured course revelation, which will help network to have smooth correspondence among its hubs.
KeyWord
Generated Key, Alternative Path, AODV, DSR, DSDV, Priority
Others Details
Paper Id : 18749
Author Name : Chandrakant Naikodi
Volume/Issue No : Volume 04 Issue 10
Page No : 17-22
DOI Number : DOI:10.21090/IJAERD.18749
Publication Date : 2017-10-05
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website : http://www.ijaerd.com/index.php
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406