DocumentCode :
1970276
Title :
Comparison of access control methods in mobile ad-hoc networks
Author :
Sukumaran, Sangheethaa ; Venkatesh, Jagannathan
Author_Institution :
Dept. of Inf. Technol., Anna Univ. - Coimbatore, Coimbatore, India
fYear :
2009
fDate :
9-11 Dec. 2009
Firstpage :
1
Lastpage :
5
Abstract :
The absence of a router or a base station urges the need for a better access control mechanism in the ad-hoc networks. All the nodes in the network need to cooperate among themselves for proper functioning of the network. It is important to provide access only to the nodes, which cooperate in routing and forwarding, and to deny access to the selfish nodes. Selfish nodes send and receive their own data but fail to forward other node´s data, which reduces the throughput of the network. This paper addresses the methods to allow access only to well behaving nodes. This paper compares some of the state of art methods for access control from the literature.
Keywords :
access control; ad hoc networks; mobile radio; routing protocols; telecommunication security; access control methods; forwarding; mobile ad-hoc networks; routing; routing protocols; Access control; Ad hoc networks; Art; Base stations; Communication system security; Fuzzy sets; Information technology; Mobile ad hoc networks; Routing protocols; Throughput; Access Control; Mobile Ad-hoc networks; malicious; reputation; routing; selfish; trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference on
Conference_Location :
Bangalore
Print_ISBN :
978-1-4244-4792-3
Electronic_ISBN :
978-1-4244-4793-0
Type :
conf
DOI :
10.1109/IMSAA.2009.5439436
Filename :
5439436
Link To Document :
بازگشت