Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
Post: #1

A Novel Secure Communication Protocol for Ad Hoc networks [SCP]

Abstract: An ad hoc network is a self organized entity with a number of mobile nodes without any centralized access point and also there is a topology control problem which leads to high power consumption and no security, while routing the packets between mobile hosts. Authentication is one of the important security requirements of a communication network. The common authentication schemes are not applicable in Ad hoc networks. In this paper, we propose a secure communication protocol for communication between two nodes in ad hoc networks. This is achieved by using clustering techniques. We present a novel secure communication framework for ad hoc networks (SCP); which describes authentication and confidentiality when packets are distributed between hosts with in the cluster and between the clusters. These cluster head nodes execute administrative functions and network key used for certification. The cluster head nodes (CHs) perform the major operations to achieve our SCP framework with help of Kerberos authentication application and symmetric key cryptography technique which will be secure reliable transparent and scalable and will have less over head.

Technology to use:2006/Java
Post: #2
send me the author of this paper.........

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: preposed system in novel secure communication for adhoc networks, base paper on scp*, communication management protocol ppt, how to run novel secure communication protocol for ad hoc,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Security Analysis of the SASI Protocol computer science topics 2 1,934 21-06-2016 10:30 PM
Last Post: Guest
  projects on computer networks? shakir_ali 2 645 25-01-2016 02:26 PM
Last Post: seminar report asees
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 606 14-07-2015 02:11 PM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,069 25-02-2015 07:17 AM
Last Post: Guest
  Fast Data Collection in Tree-Based Wireless Sensor Networks Projects9 9 3,058 12-03-2014 06:30 PM
Last Post: computer topic
  Face Recognition Using Artificial Neural Networks nit_cal 2 3,753 20-04-2013 11:25 AM
Last Post: computer topic
  Image Transfer Protocol for Internt project topics 3 1,384 26-03-2013 07:42 PM
Last Post: vvk chary
  A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video electronics seminars 4 2,050 23-03-2013 07:40 PM
Last Post: [email protected]
  Secure Multipart File Transfer projectsofme 4 3,079 07-03-2013 05:16 PM
Last Post: Guest