e-ISSN : 0975-4024 p-ISSN : 2319-8613   
CODEN : IJETIY    

International Journal of Engineering and Technology

Home
IJET Topics
Call for Papers 2021
Author Guidelines
Special Issue
Current Issue
Articles in Press
Archives
Editorial Board
Reviewer List
Publication Ethics and Malpractice statement
Authors Publication Ethics
Policy of screening for plagiarism
Open Access Statement
Terms and Conditions
Contact Us

ABSTRACT

ISSN: 0975-4024

Title : SMTCI: Secure Multi-Trial Trust Evaluation and Cost- Effective Incentive Mechanism for Multi-Hop Cellular Networks
Authors : B.Sumathi, V.Hamsadhwani
Keywords : Multi-Hop Cellular Networks, Multi-Trial Trust Evaluation, Payment Schemes, Wireless Communication.
Issue Date : Apr-May 2013
Abstract :
In multi-hop cellular networks, finding an optimum and trusted route in the network through intermediate node is a major issue. At MCN, or the next-generation wireless networks, can significantly improve network performance and deployment and help implement many novel applications and services. However, when compared to wired and single-hop wireless networks, MCNs are highly vulnerable to serious security threats because packets may be relayed through integrated networks and autonomous devices. Our Proposed work has been focusing on developing secure trust based protocols for securing MCNs. Specifically, we are interested in securing route establishment and data transmission processes, establishing stable routes, and preserving users’ anonymity and location privacy. In this paper we propose a multi-trial trust evaluation scheme, trusted node based ad hoc routing using trials to establish security accomplishes establishment of trusted networks in MANETs. We apply the same idea to develop our proposed algorithm TBARA to rate neighbor nodes using hash values for identifying the misbehaving nodes. After the successful transmission of packets from source to destination, the destination will send acknowledgement for the corresponding packet, upon receiving of acknowledgement incentive will be generated. It reduces the number of public-key cryptographic operations and protect against collusion attack.
Page(s) : 1298-1305
ISSN : 0975-4024
Source : Vol. 5, No.2