Explain about security aware protocols, Computer Network Security

Assignment Help:

Q. Explain about Security aware protocols?

The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides sufficient security on WSN affirms that SAR overcomes apparent weaknesses in traditional methods of determining distances between nodes based on hops by providing new routing measurements based on geographic location and other attributes enables secure implementation based on the forwarding behavior of broadcast packets. The distance between WSN nodes might not be the shortest, and the most secure, based on a quantifiable secure route. Based on the SAR protocol, the nodes in the network are mirrored into a hierarchy based on explicit partial-ordering of privilege levels.

In QoP, Each node is assigned trust levels which cannot be arbitrarily changed. The interception, modification, or subversion of messages on transmission is protected by the triple key management mechanism integrated into the security solutions. The security of the packets on transmission based on the (Security-aware AODV) protocol requires the addition of the RQ SEC REQUIREMENT to discover a packet en-route. Nodes that receive the RREQ packet assess the integrity and security compliance status and the protocol forwards the packet if it is deemed secure. Packets that fall short of the security requirement are dropped.


Related Discussions:- Explain about security aware protocols

Elliptic Curves, #questioAn elliptic curve y^2=x^3+ax+b(mod29) includes poi...

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Need assignemnt help in information security assignemnt, Need Assignemnt he...

Need Assignemnt help in Information security assignemnt

Illustrate the label switching procedure in an mpls network, QUESTION ...

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Address resolution techniques, Address resolution algorithms may be grouped...

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Explain how the framework will align to the model, MB Enterprise Systems Lt...

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

Collision detection, COLLISION DETECTION The signals from two devices ...

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

Wireless sensor networks, The project will be involving a design and a repo...

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

What is meant by certificate revocation, QUESTION (a) Which PKI (Public...

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd