{"title":"基于身份密码的认知路由模型","authors":"G. Shanthi, M. Durga","doi":"10.1504/IJMNDI.2018.10015835","DOIUrl":null,"url":null,"abstract":"In MANET, trust-based routing algorithm is the major protocol for selecting optimal route path. The optimal path is selected based on the available maximum path trust value in the network and the transmission is occurred through this selected trust path. This kind of transmission should be securable and energy efficient. So, in this paper we have exhibited a trust model for routing with identity-based cryptography in MANET. For effective course way choice we have proposed cognitive agent-based trust model. Cognitive agents are the self-sufficient projects which sense the environment, follow up on nature, and utilise its information to accomplish their goal(s). This cognitive agent is developed with the behaviours-observations-beliefs (BOB) model to assess the convictions or trust esteem for every node in MANET. For securable transmission, likewise we have proposed identity-based cryptography. In identity-based cryptosystem, confirmation of client's legitimacy is accomplished by its one of a unique identifier (ID). Private key produces from a private key generator (PKG) while the public key is acquired from client's ID. From the simulation results, we show that better packet delivery ratio, energy consumption, throughput compared to the previous work.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"4 1","pages":"207"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cognitive-based routing model with identity-based cryptography in MANET\",\"authors\":\"G. Shanthi, M. Durga\",\"doi\":\"10.1504/IJMNDI.2018.10015835\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In MANET, trust-based routing algorithm is the major protocol for selecting optimal route path. The optimal path is selected based on the available maximum path trust value in the network and the transmission is occurred through this selected trust path. This kind of transmission should be securable and energy efficient. So, in this paper we have exhibited a trust model for routing with identity-based cryptography in MANET. For effective course way choice we have proposed cognitive agent-based trust model. Cognitive agents are the self-sufficient projects which sense the environment, follow up on nature, and utilise its information to accomplish their goal(s). This cognitive agent is developed with the behaviours-observations-beliefs (BOB) model to assess the convictions or trust esteem for every node in MANET. For securable transmission, likewise we have proposed identity-based cryptography. In identity-based cryptosystem, confirmation of client's legitimacy is accomplished by its one of a unique identifier (ID). Private key produces from a private key generator (PKG) while the public key is acquired from client's ID. From the simulation results, we show that better packet delivery ratio, energy consumption, throughput compared to the previous work.\",\"PeriodicalId\":35022,\"journal\":{\"name\":\"International Journal of Mobile Network Design and Innovation\",\"volume\":\"4 1\",\"pages\":\"207\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Mobile Network Design and Innovation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJMNDI.2018.10015835\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Business, Management and Accounting\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Network Design and Innovation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJMNDI.2018.10015835","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
Cognitive-based routing model with identity-based cryptography in MANET
In MANET, trust-based routing algorithm is the major protocol for selecting optimal route path. The optimal path is selected based on the available maximum path trust value in the network and the transmission is occurred through this selected trust path. This kind of transmission should be securable and energy efficient. So, in this paper we have exhibited a trust model for routing with identity-based cryptography in MANET. For effective course way choice we have proposed cognitive agent-based trust model. Cognitive agents are the self-sufficient projects which sense the environment, follow up on nature, and utilise its information to accomplish their goal(s). This cognitive agent is developed with the behaviours-observations-beliefs (BOB) model to assess the convictions or trust esteem for every node in MANET. For securable transmission, likewise we have proposed identity-based cryptography. In identity-based cryptosystem, confirmation of client's legitimacy is accomplished by its one of a unique identifier (ID). Private key produces from a private key generator (PKG) while the public key is acquired from client's ID. From the simulation results, we show that better packet delivery ratio, energy consumption, throughput compared to the previous work.
期刊介绍:
The IJMNDI addresses the state-of-the-art in computerisation for the deployment and operation of current and future wireless networks. Following the trend in many other engineering disciplines, intelligent and automatic computer software has become the critical factor for obtaining high performance network solutions that meet the objectives of both the network subscriber and operator. Characteristically, high performance and innovative techniques are required to address computationally intensive radio engineering planning problems while providing optimised solutions and knowledge which will enhance the deployment and operation of expensive wireless resources.