JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network

The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing syst...

Full description

Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Zulkurnain, Nurul Fariza, Olanrewaju, Rashidah Funke, Nissar, Gousia, Baba, Asifa Mehraj, Lone, Sajad Ahmad
Format: Conference or Workshop Item
Language:English
Published: Springer, Cham 2017
Subjects:
Online Access:http://irep.iium.edu.my/58190/
http://irep.iium.edu.my/58190/
http://irep.iium.edu.my/58190/
http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf
id iium-58190
recordtype eprints
spelling iium-581902017-09-05T04:23:57Z http://irep.iium.edu.my/58190/ JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique. Springer, Cham 2017-08-23 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf Khan, Burhan Ul Islam and Zulkurnain, Nurul Fariza and Olanrewaju, Rashidah Funke and Nissar, Gousia and Baba, Asifa Mehraj and Lone, Sajad Ahmad (2017) JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016, 21st-22nd September 2016, London, United Kingdom. https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50 10.1007/978-3-319-56991-8_50
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
T10.5 Communication of technical information
TK7885 Computer engineering
spellingShingle QA75 Electronic computers. Computer science
T10.5 Communication of technical information
TK7885 Computer engineering
Khan, Burhan Ul Islam
Zulkurnain, Nurul Fariza
Olanrewaju, Rashidah Funke
Nissar, Gousia
Baba, Asifa Mehraj
Lone, Sajad Ahmad
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
description The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique.
format Conference or Workshop Item
author Khan, Burhan Ul Islam
Zulkurnain, Nurul Fariza
Olanrewaju, Rashidah Funke
Nissar, Gousia
Baba, Asifa Mehraj
Lone, Sajad Ahmad
author_facet Khan, Burhan Ul Islam
Zulkurnain, Nurul Fariza
Olanrewaju, Rashidah Funke
Nissar, Gousia
Baba, Asifa Mehraj
Lone, Sajad Ahmad
author_sort Khan, Burhan Ul Islam
title JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_short JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_full JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_fullStr JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_full_unstemmed JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
title_sort jir2ta: joint invocation of resource-based thresholding and trust-oriented authentication in mobile adhoc network
publisher Springer, Cham
publishDate 2017
url http://irep.iium.edu.my/58190/
http://irep.iium.edu.my/58190/
http://irep.iium.edu.my/58190/
http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf
first_indexed 2023-09-18T21:22:16Z
last_indexed 2023-09-18T21:22:16Z
_version_ 1777411960418074624