----------------------------------------------------------------------------------------------------------------------
Want to Receive FREE Projects List / Abstracts DVD…
Walk in to our Office and Collect the Abstracts DVD...
Or
Send your College ID scan copy, Your Mobile No & Complete Postal Address, Mentioning you are interested to Receive DVD through Courier at Free of Cost
Mail to - ncctchennai@gmail.com
---------------------------------------------------------------------------------------------------------------------------------------------
 
 

Friday, September 2, 2011

SECURED COMMUNICATION FOR MANETS IN MILITARY


SECURED COMMUNICATION FOR MANETS IN MILITARY 
ABSTRACT
A new way to increase the security of data transmission of mobile ad hoc networks [MANETS] is presented in this work. There is a massive increase in using MANETS for unmanned army system for both surveillance and future combat operations. This has necessitated the development of innovative MANET solutions catering to the reliability, security and scalability needs of the defense communications environment.  Security and reliability are crucial aspects of MANET, especially in security sensitive applications like military. 
Secure Message Transmission SMT[1] protocol  secure the data transmission phase by tailoring an end-to-end secure data forwarding protocol to the MANET communication requirements and increases the reliability through  transmitting the messages in multiple paths with minimal redundancy. This work increases the through the removal of Byzantine Faults [8] in the multiple paths. A binary search probing technique which is resilient to Byzantine failures caused by individual or colluding nodes is incorporated in the SMT protocol to provide more secured transmission. The fault detection algorithm bounds logarithmically (log n –n the number of nodes in the path), so the delay is reduced drastically. 
The simulated implementation of the work in NS2 shows the marginal increase in the throughput. The delay and jitter variants can also be improved if the nodes location can be predicted. Predicting the nodes location and reducing the unnecessary traffic with the aid of Spatial and Temporal mining is the second phase of this work.  

No comments:

Post a Comment