Call for papers :

Submission Last Date 31/12/2017
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
Identifying Froud Nodes Using Key Sharing Techniques Through Alternative Path and Key Generation for Protected Communication in MANETs
Abstract
In this network, after hubs arrangement, every hub will have or figure Trust Value (TV) for every one of its neighbors in view of its execution, effectiveness, QOS and different parameters. On the off chance that anyone needs to speak with some other hub, at that point source hub must request that its neighbors pick conceivable PATH2 and not to choose certain path or not to choose most expected path i.e. PATH1 which is minimal effort/most limited path, at that point source hub will send a mystery key or mystery path course key(summation/control of all hubs in the path) to the looking for hub, at that point searcher hub will hold/spare the key for settled measure of time. This procedure occurs for all hubs of a specific path which will include in the correspondence. After this procedure, source hub will solicit key shape all hubs from most brief/minimal effort path called PATH1 and confirm a similar key with the one which has sent before to those hubs. Along these lines, we can kill the malignant hubs as these hubs cannot send the key which is asked by some other hubs. Consequently, it guarantees secured correspondence among honest to goodness hubs.
KeyWord
MANET, Malicious, Alternative Path, Inter- mediate Key
Others Details
Paper Id : 70947
Author Name : Chandrakant Naikodi
Volume/Issue No : Volume 04 Issue 10
Page No : 14-16
DOI Number : DOI:10.21090/IJAERD.70947
Publication Date : 2017-10-05
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website : http://www.ijaerd.com/index.php
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406