Title :
Comparison of access control methods in mobile ad-hoc networks
Author :
Sukumaran, Sangheethaa ; Venkatesh, Jagannathan
Author_Institution :
Dept. of Inf. Technol., Anna Univ. - Coimbatore, Coimbatore, India
Abstract :
The absence of a router or a base station urges the need for a better access control mechanism in the ad-hoc networks. All the nodes in the network need to cooperate among themselves for proper functioning of the network. It is important to provide access only to the nodes, which cooperate in routing and forwarding, and to deny access to the selfish nodes. Selfish nodes send and receive their own data but fail to forward other node´s data, which reduces the throughput of the network. This paper addresses the methods to allow access only to well behaving nodes. This paper compares some of the state of art methods for access control from the literature.
Keywords :
access control; ad hoc networks; mobile radio; routing protocols; telecommunication security; access control methods; forwarding; mobile ad-hoc networks; routing; routing protocols; Access control; Ad hoc networks; Art; Base stations; Communication system security; Fuzzy sets; Information technology; Mobile ad hoc networks; Routing protocols; Throughput; Access Control; Mobile Ad-hoc networks; malicious; reputation; routing; selfish; trust;
Conference_Titel :
Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference on
Conference_Location :
Bangalore
Print_ISBN :
978-1-4244-4792-3
Electronic_ISBN :
978-1-4244-4793-0
DOI :
10.1109/IMSAA.2009.5439436