Emergency Data Transmission for Disaster Planning in MANETs
Keywords:
Wireless Network, Ad-hoc Network, secure message transmission,, secure message communicationAbstract
Wireless Ad-hoc Networks encompass variety of nodes that communicate with one another over a wireless channel that have numerous forms of networks, device networks, ad-hoc networks, and so on. The most drawback in these channels is expounded to security as a result of the secure communication, a very important side of any networking setting, is associate particularly vital challenge in spontaneous networks. A reliable system for such message exchanges is considered to be a particular strength for such organizations. Information security is a more general concern for officers of the armed forces and armed forces personnel is in constant pursuit of better procedures to ensure data protection and integrity. Privacy is needed in Ad-hoc networks. A secured on demand position based private routing algorithm is proposed for communication and which provides a security in Mobile Ad-hoc Network. This proposed is used for security to prevent message hacking information from internal & external attackers
References
[1] Papadimitratos, P. Haas, Z.J, “Secure data communication in mobile ad-hoc networks”, This paper appears in: Selected Areas in Communications, IEEE Journal on Publication Date: Feb. 2006, Volume: 24, Issue: 2, On page(s): 343- 356.
[2] Reza Curtmola Cristina Nita-Rotaru, “BSMR: Byzantine- Resilient Secure Multicast Routing in Multihop Wireless Networks”, IEEE Transactions on Mobile Computing, vol. 8, Issue. 4, pp. 445 - 459, February 2009.
[3] A.Tsirigos and Z.J.Hass (2004), “Analysis of multipath routing, Part 1: The effects on the packet delivery ratio” IEEE Transactions on Wireless Communication., vol.3, no.2, pp: 500-511
[4] Banner, R. Orda, A, “Multipath Routing Algorithms for Congestion Minimization”. This paper appears in: Networking, IEEE/ACM Transactions on Publication Date: April 2007 Volume: 15, Issue: 2, on page(s): 413-424.
[5] P.Papadimitratos and Z.J.Hass, “Secure Routing for Mobile Ad Hoc Networks”, in proceeding of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS-2002).
[6] Papadimitratos, P. Haas, Z.J and E.G.Sirer, “Path set selection in mobile ad hoc Networks”,in Proc 3rd ACM MobiHoc, Lausanne, Switzerland, Jun 2002 ,pp 1-11.
[7] J. G. Jetcheva and D. B. Johnson, “Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks.” In Proc. of MobiHoc, 2001, pp. 33–44.
[8] L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” in Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, 1995.
[9] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad-hoc networks,” in Proc. of CNDS, January 2002, pp. 27–31.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
