Comparison of access control methods in mobile as-hoc networks

  • Authors:
  • Sangheethaa Sukumaran;J. Venkatesh

  • Affiliations:
  • Research Scholar, Department of Information Technology, Anna University-Coimbatore, Coimbatore, Tamil Nadu, India;School of Management Studies, Anna University-Coimbatore, Coimbatore, Tamil Nadu, India

  • Venue:
  • IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The absence of a router or a base station urges the need for a better access control mechanism in the ad-hoc networks. All the nodes in the network need to cooperate among themselves for proper functioning of the network. It is important to provide access only to the nodes, which cooperate in routing and forwarding, and to deny access to the selfish nodes. Selfish nodes send and receive their own data but fail to forward other node's data, which reduces the throughput of the network. This paper addresses the methods to allow access only to well behaving nodes. This paper compares some of the state of art methods for access control from the literature.