JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing syst...
| Main Authors: | , , , , , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
Springer, Cham
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/58190/ http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf |
| _version_ | 1848785067234557952 |
|---|---|
| author | Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad |
| author_facet | Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad |
| author_sort | Khan, Burhan Ul Islam |
| building | IIUM Repository |
| collection | Online Access |
| description | The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique. |
| first_indexed | 2025-11-14T16:47:15Z |
| format | Proceeding Paper |
| id | iium-58190 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T16:47:15Z |
| publishDate | 2017 |
| publisher | Springer, Cham |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-581902017-09-05T04:23:57Z http://irep.iium.edu.my/58190/ JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network and explored that there are still a lot of scopes to enhance the security level. This paper presents a non-cryptographic technique called as JIR2TA or Joint Invocation of Resource-based Thresholding and Trust-oriented Authentication using resource and trust factor to intensify the routing policies for strengthening the authentication process of a mobile node. The outcome of the study shows better packet delivery ratio, computational time, throughput, and end-to-end delay in contrast to existing secure routing technique. Springer, Cham 2017-08-23 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf Khan, Burhan Ul Islam and Zulkurnain, Nurul Fariza and Olanrewaju, Rashidah Funke and Nissar, Gousia and Baba, Asifa Mehraj and Lone, Sajad Ahmad (2017) JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016, 21st-22nd September 2016, London, United Kingdom. https://link.springer.com/chapter/10.1007/978-3-319-56991-8_50 10.1007/978-3-319-56991-8_50 |
| spellingShingle | QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering Khan, Burhan Ul Islam Zulkurnain, Nurul Fariza Olanrewaju, Rashidah Funke Nissar, Gousia Baba, Asifa Mehraj Lone, Sajad Ahmad JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
| title | JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
| title_full | JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
| title_fullStr | JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
| title_full_unstemmed | JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
| title_short | JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network |
| title_sort | jir2ta: joint invocation of resource-based thresholding and trust-oriented authentication in mobile adhoc network |
| topic | QA75 Electronic computers. Computer science T10.5 Communication of technical information TK7885 Computer engineering |
| url | http://irep.iium.edu.my/58190/ http://irep.iium.edu.my/58190/ http://irep.iium.edu.my/58190/ http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf |