RAD: Reinforcement Authentication DYMO Protocol for MANET

dc.contributor.authorHamamreh, Rushdi A.
dc.contributor.authorAyyad, Mohammad
dc.contributor.authorJamoos, Mohammad
dc.date.accessioned2021-03-30T08:12:54Z
dc.date.available2021-03-30T08:12:54Z
dc.date.issued2019-12-27
dc.description.abstractMobile ad hoc network (MANET) does not have fixed infrastructure or centralized server which manages the connections between the nodes. Rather, the nodes in MANET move randomly. Thus, it is risky to exchange data between nodes because there is a high possibility of having malicious node in the path. In this paper, we will describe a new authentication technique using message digest 5 (MD5), hashing for dynamic MANET on demand protocol (DYMO) based on reinforcement learning. In addition, we will describe an encryption technique that can be used without the need for a third party to distribute a secret key. After implementing the suggested model, results showed a remarkable enhancement in securing the path by increasing the packet delivery ratio and average throughput. On the other hand, there was an increase in end to end delay due to time spent in cryptographic operations.en_US
dc.identifier.citationDOI: 10.1109/ICPET.2019.00032en_US
dc.identifier.urihttps://dspace.alquds.edu/handle/20.500.12213/6358
dc.language.isoen_USen_US
dc.publisherICPET2019en_US
dc.relation.ispartofseriesICPET2019;
dc.subjectRADen_US
dc.subjectMANETen_US
dc.subjectauthenticationen_US
dc.subjectencryptionen_US
dc.subjectreinforcementen_US
dc.titleRAD: Reinforcement Authentication DYMO Protocol for MANETen_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
mohammadayyad.pdf
Size:
401.62 KB
Format:
Adobe Portable Document Format
Description:
RAD
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed upon to submission
Description: