Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, 2013 9th International Computer Engineering Conference (ICENCO)
…
21 pages
1 file
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information sharing is a difficult task especially for highly dynamic military MANETs. To address this requirement, we propose a new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. In our protocol, we bring novelties to secure military MANET communication for three main points: Cryptographic methods used in MANETs, hybrid key management protocols and structural organization of the military MANETs. As a new approach, we use hybrid cryptography mechanisms and Elliptic Curve Pintsov-Vanstone Signature Scheme (ECPVSS) that provide security and performance advantages when compared to some traditional cryptographic methods. Furthermore, multi-leveled security approach of our protocol provides adaptive solutions according to the requirements of different military units in the MANET. We also use a hybrid key management technique that combines the benefits of both decentralized protocols with single point of failure resistivity and centralized protocols with low rekeying cost. Last, the proposed network structure facilitates certification and key management for the MANET by providing flexibility for Mobile Backbone Network (MBN) tiers.
Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature.
Materials Today: Proceedings, 2020
In the recent networking era, Mobile Adhoc Network has been popular as it effectively solves the limitations that were pertaining with single path routers. Multi-path mobile adhoc networks (MANETs) have various advantages which include high throughput, lower time complexity and high energy efficiency. The major challenges here are the key management and secured way of routing. Secure routing ensures data integrity, confidentiality, authorization and authentication and non-repudiation. These requirements are satisfied only by cryptographic algorithms. Key management is the most essential one in cryptography. The management of keys which is integrated with the protocol start with trusted and network with more authentication. In order to ensure the secured broadcasting in MANET, here we proposed a secured multipath routing mechanism for reliable data transmission using cryptographic algorithms. In our proposed method, we are hybridizing the popular Diffie-Hellman method of key exchange and elliptic curve cryptography (HDHECC). First, the nodes are subjected to clustering using the LEACH protocol and the cluster head selection process will be carried out with the help of weight of each node. Here the trust mechanism will be done by using the AOMDV. For the management of keys, every head of the cluster is made to retain its public key of the corresponding member nodes and are made to act only as a router. The proposed technique solves the overhead of the centralized management of keys. Moreover, the requirement to store all the public keys. The propose method is tested for its performance by evaluating the end-end delay, Packet delivery ratio and packet losses. The implementation is carried out using the NS2 simulator.
Mobile Ad-hoc Network (MANET) is special types of mobile wireless network where the groups of mobile devices form a temporary network without any kind of an infrastructure. It is very usefully due to its self maintenance, self organizing and by reason of mobility of wireless communication. Two major issues are found in such kind of network performance and security. In mobile ad-hoc network there are so many attacks which reduced the performance of network. In this paper we have focus only active attacks in network layer. Ad Hoc On-Demand Vector Routing protocol is a reactive routing protocol for ad hoc networks that maintain routes only between nodes which want to communicate by using routing messages. AODV provide loop free routes during link breakages.SAODV are a secure routing protocol based on trust model for mobile ad-hoc network. For provide security and increase performance in MANET, we have applied SAODV protocol andour solution uses Hybrid Cryptography Technique (DES, RSA Algorithms) on SAODV. This paper presents comparison based on simulation of AODV, SAODV routing protocol of MANET with Different parameters like energy, packet delivery ratio and throughput. The proposed cryptographic routing algorithm is implemented through the NS2 network simulation environment.The outcome of our proposed method the energy is low; packet delivery ratio and throughput are high as compare to traditional method.
IOSR Journal of Computer Engineering, 2014
The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attackers. So, we use an intrusion detection system called Enhanced Adaptive ACKnowledgement (EAACK) especially for mobile adhoc networks. Based on the digital signature algorithm (DSA) and RSA the EAACK is designed. To enhance the strength of the security in the mobile adhoc networks, we introduce an innovative approach called Hybrid Security Protocol that provides integrity, confidentiality and authentication. This Hybrid Security Protocol consists of Cryptography based on Elliptic curve, Dual-RSA algorithm and Message Digest MD5. Encryption is achieved by using Elliptic Curve Cryptography, Dual-RSA algorithm for authentication and MD-5 for integrity. By using a combination of both symmetric and asymmetric cryptographic techniques, we achieve better security with integrity.
IFIP International Federation for Information Processing, 2006
Many public key infrastructure (PKI) approaches have been proposed in the recent years to secure mobile ad hoc networks (MANETs). We present a new hybrid key management infrastructure, which combines the concepts of PKIs for MANET with trusted-third-party based infrastructures. In our hybrid approach, the underlying PKI is merely used to set-up initial trust of nodes in a MANET, and, thus, generate a random trust graph connecting all the nodes of the MANET. Then, MANET nodes cooperate to securely distribute trust information and symmetric keys to other nodes through the shortest trust path. The hybrid key management infrastructure enables the same security services as a normal PKI yet key establishment and node-to-node authentication, as demonstrated by our performance analysis, is substantially improved in terms of computational and communication efficiency. We also discuss the security level of the hybrid approach.
2015
Mobile ad-hoc network offers an effective way of short range communication with infrastructure less environment. In this wireless network the routing is performed by node itself without any centralized administrative controls. It also supports dynamic topologies which causes heavy movement of nodes within a specific range. In such environment, verifying the nodes authenticity and achieving data confidentiality is a challenging task. Unlike the wired medium, infrastructure less networks has not accumulated with proper security controls. It causes high attack rates such as DoS, impersonation, fabrication, blackhole, spoofing etc attacks associated with data drops and performance reductions. Apart from these MANET suffers from various security vulnerabilities. Such networks can only assure protection of data and control packets by identifying the nodes reliability with a robust authentication and signature mechanism. Also the protocol developed for MANET must be of light weight in natu...
2018
A communication network is needed in case of emergency such as disaster or any rescue operations such as Military wars. We need an immediate communication network. In such cases a temporary network such as Mobile Ad hoc Network is created. MANET is a temporarily formed network, which is a self -forming and selfconfiguring network. Since MANETs are taking help from neighboring nodes, there is no guarantee that the responding node is a trusted node. The intermediate node should not change the content of the message. Many researches have provided solutions to this problem in the form of assigning certificates to the trusted nodes, verifying signatures of the nodes, authenticating the message, encrypting(hiding the message) etc. We propose a new encryption technique named as TIC-TOC-TOE encryption, which encrypts the data to be sent with prescribed shapes. So by using encoding and encryption data can be protected from eavesdropping.
IAEME PUBLICATION, 2014
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes along with wireless transmitter and receiver that with each other via a bi-directional links either directly or indirectly. A new intrusion detection system named communicates Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. It is based on the digital signature algorithm (DSA). To enhance the security in the mobile adhoc networks, we introduce a new approach called Hybrid cryptography algorithm that provides integrity, confidentiality and authentication. This hybrid cryptography algorithm is based on two cryptography algorithms such as RSA and AES. Encryption is achieved by using, RSA algorithm for authentication and symmetric algorithm for the integrity. By using the symmetric and asymmetric cryptographic algorithm, we can achieve better security and integrity than the EAACK.
In MANETs communication is done using a shared wireless channel. There is no provision for monitoring authority. The nodes in the network need to take the responsibility for both data transfer and also security. For robust security in MANETs, key management scheme is essential. However, secure key management is a challenging problem to be addressed. In this paper, we focused on a hybrid technique that makes use of identity and trust which enables to identify malicious nodes and also convert malicious node into a trusted node. Our hash technique is evaluated with NS2 simulations. The results reveal that the proposed system is able to identify malicious nodes in MANET and handle malicious nodes in such a way that they become trusted nodes.
Mobile Ad-hoc Network (MANET) is an important field where many of the users are using mobile devices for last few years where ad-hoc routing in networks is one of the prominent issues. A malicious node can drop the routing information, data packets intentionally and disturb the process of the routing protocol. To solve this problem, we proposed a novel approach for effective key management, and prevention of malicious nodes. Security to the routing protocol is incorporated using traditional SHA algorithm along with symmetric and asymmetric key encryption methods. The performance of the proposed algorithms is analyzed with different algorithms and results are shown improvement in terms of the time taken to transfer the data, communication overheads and battery consumption.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Engineering Sciences & Research Technology , 2014
International journal of Computer Networks & Communications, 2014
IOSR Journal of Computer Engineering, 2014
Journal of Systems and Software, 2007
Journal of Information and Optimization Sciences, 2017
International Journal of Science Technology & Engineering
International Journal of Engineering & Technology
International Journal of Innovative Research in Computer and Communication Engineering, 2015
Computer Networks, 2005
The ISC International Journal of Information Security, 2020
Journal of Network and Computer Applications, 2007