Explain about security aware protocols, Computer Network Security

Q. Explain about Security aware protocols?

The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides sufficient security on WSN affirms that SAR overcomes apparent weaknesses in traditional methods of determining distances between nodes based on hops by providing new routing measurements based on geographic location and other attributes enables secure implementation based on the forwarding behavior of broadcast packets. The distance between WSN nodes might not be the shortest, and the most secure, based on a quantifiable secure route. Based on the SAR protocol, the nodes in the network are mirrored into a hierarchy based on explicit partial-ordering of privilege levels.

In QoP, Each node is assigned trust levels which cannot be arbitrarily changed. The interception, modification, or subversion of messages on transmission is protected by the triple key management mechanism integrated into the security solutions. The security of the packets on transmission based on the (Security-aware AODV) protocol requires the addition of the RQ SEC REQUIREMENT to discover a packet en-route. Nodes that receive the RREQ packet assess the integrity and security compliance status and the protocol forwards the packet if it is deemed secure. Packets that fall short of the security requirement are dropped.

Posted Date: 7/27/2013 6:15:50 AM | Location : United States







Related Discussions:- Explain about security aware protocols, Assignment Help, Ask Question on Explain about security aware protocols, Get Answer, Expert's Help, Explain about security aware protocols Discussions

Write discussion on Explain about security aware protocols
Your posts are moderated
Related Questions
Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

what are the participant of marketing channal?

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

what is hacking

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

Discuss how developers should apply the following countermeasures to improve the security of their code: