ISBN-13: 9783659623660 / Angielski / Miękka / 2014 / 64 str.
The routing in ICMN is an intricate task but recent techniques have adopted many routing methodologies with reasonable performance, the mode of secure communication remains a dispute. Enhancing security across such spasmodic environment requires tremendous effort that establishing security criterion should not degrade the performance of routing. Also the main application of ICMN is for military reconnaissance scenario, the security issues are to be employed under consideration. Hence the objective of the research prevails with the motto of implementing security mechanisms without altering the original routing performance.This secure routing aids in detecting and preventing intrusion of malicious nodes. The routing process is made adorable through ANT colony optimization (ACO). Since ICMN is prompt to higher delays certain authentication series are used to enable secure communication within the network.
The routing in ICMN is an intricate task but recent techniques have adopted many routing methodologies with reasonable performance, the mode of secure communication remains a dispute. Enhancing security across such spasmodic environment requires tremendous effort that establishing security criterion should not degrade the performance of routing. Also the main application of ICMN is for military reconnaissance scenario, the security issues are to be employed under consideration. Hence the objective of the research prevails with the motto of implementing security mechanisms without altering the original routing performance.This secure routing aids in detecting and preventing intrusion of malicious nodes. The routing process is made adorable through ANT colony optimization (ACO). Since ICMN is prompt to higher delays certain authentication series are used to enable secure communication within the network.