Open Access
Subscription Access
Open Access
Subscription Access
Analysis of Reliable Secure Transmission for Unobservable Secure Table Driven Protocol
Subscribe/Renew Journal
USOR solves the problem of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can’t incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N[12]. which is a routing protocol that uses the decentralization of the knowledge about the best route through the network — no single node has all the data. This technique eliminates the need to spread information concerning network changes to every node in the network. The individual node only saves information about the ―direction‖ it received data from and sends its data accordingly. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.USOR schemes delivery packet ratio has been an enormous session management system in networking communications.
Keywords
USOR, ID-Based Encryption, B. A. T. M. A. N.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 247
PDF Views: 3