Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2016
…
4 pages
1 file
— A mobile ad hoc network (MANET) is self-organizing, dynamic topology network, which is formed by a collection of mobile nodes through radio links. MANETs enable wireless communication between mobile devices without relying on a fixed infrastructure. Hence, routing in dynamic network is a new challenge. We used various routing algorithms for smooth exchange of information between mobile nodes. Generally we imply security on all the nodes of the network. But this causes wastage of time and cost. This paper proposes that first we have to find out the shortest path and then imply the security in multicast routing. The routing is done with the help of GDH and the Encryption and Decryption of data is done with the help of a new Cryptographic technique that i have proposed in this paper. This proposed scheme will improve the performance of the network such as delay and packet delivery ratio than traditional routing algorithms.
Materials Today: Proceedings, 2020
In the recent networking era, Mobile Adhoc Network has been popular as it effectively solves the limitations that were pertaining with single path routers. Multi-path mobile adhoc networks (MANETs) have various advantages which include high throughput, lower time complexity and high energy efficiency. The major challenges here are the key management and secured way of routing. Secure routing ensures data integrity, confidentiality, authorization and authentication and non-repudiation. These requirements are satisfied only by cryptographic algorithms. Key management is the most essential one in cryptography. The management of keys which is integrated with the protocol start with trusted and network with more authentication. In order to ensure the secured broadcasting in MANET, here we proposed a secured multipath routing mechanism for reliable data transmission using cryptographic algorithms. In our proposed method, we are hybridizing the popular Diffie-Hellman method of key exchange and elliptic curve cryptography (HDHECC). First, the nodes are subjected to clustering using the LEACH protocol and the cluster head selection process will be carried out with the help of weight of each node. Here the trust mechanism will be done by using the AOMDV. For the management of keys, every head of the cluster is made to retain its public key of the corresponding member nodes and are made to act only as a router. The proposed technique solves the overhead of the centralized management of keys. Moreover, the requirement to store all the public keys. The propose method is tested for its performance by evaluating the end-end delay, Packet delivery ratio and packet losses. The implementation is carried out using the NS2 simulator.
Mobile Ad-hoc Network (MANET) is an important field where many of the users are using mobile devices for last few years where ad-hoc routing in networks is one of the prominent issues. A malicious node can drop the routing information, data packets intentionally and disturb the process of the routing protocol. To solve this problem, we proposed a novel approach for effective key management, and prevention of malicious nodes. Security to the routing protocol is incorporated using traditional SHA algorithm along with symmetric and asymmetric key encryption methods. The performance of the proposed algorithms is analyzed with different algorithms and results are shown improvement in terms of the time taken to transfer the data, communication overheads and battery consumption.
International Journal of Safety and Security Engineering (IJSSE), 2020
A Mobile Ad Hoc Network (MANET) is combined with number of versatile nodes that can communicate with one another without having any predefined foundation. These versatile nodes in the MANET go about as routers to transfer the information from source to destination. Since there is an expansion in number of portable clients and its applications, the versatile nodes security assumes a significant job in it. Even there are many methods for providing security to MANET, there are still several attacks causing in MANET. Secure data transfer in MANET can be achieved by introducing strong cryptographic methods and key exchange techniques. The reason for key generation and key maintenance is to give secure techniques for avoiding malicious activities in the MANET and to increase system performance. In this paper a strong cryptographic method is proposed, which generates and maintains keys and distribute keys safely to trusted nodes avoiding malicious nodes. The proposed method detects the malicious nodes and avoids them to participate in communication to improve packet delivery rate and to reduce delay in the network. The proposed method considers a node as a MANET Key Calculator (MKC) which generates keys and selects another node as MANET Key Distributer (MKD) for providing secure data transfer in MANET by applying cryptography methods. The proposed method is compared with traditional methods and the results show that the proposed method is exhibiting better performance.
Mobile Ad-Hoc Networks: Protocol Design, 2011
2018
A communication network is needed in case of emergency such as disaster or any rescue operations such as Military wars. We need an immediate communication network. In such cases a temporary network such as Mobile Ad hoc Network is created. MANET is a temporarily formed network, which is a self -forming and selfconfiguring network. Since MANETs are taking help from neighboring nodes, there is no guarantee that the responding node is a trusted node. The intermediate node should not change the content of the message. Many researches have provided solutions to this problem in the form of assigning certificates to the trusted nodes, verifying signatures of the nodes, authenticating the message, encrypting(hiding the message) etc. We propose a new encryption technique named as TIC-TOC-TOE encryption, which encrypts the data to be sent with prescribed shapes. So by using encoding and encryption data can be protected from eavesdropping.
IJARCCE
Mobile Ad-Hoc Networks presume that nodes spontaneous cooperate in order to work correctly. This collaboration process is based on performance and quality.And then some nodes can rubbish to this performance, finding to effecient node processing. Thus, the whole network process could be affected. The use of previous framework is well to find effective nodes. However in this process more energy used for detecting process and lack of network lifetime, to overcome this above problem, we propose a new method based on a secret parameterallocation for major precaution in all type of Networks. In Mobile Ad-Hoc Networks, the estimation load and complication for key management is mainly subject to limitation of the node's accessible resources and the aggressive personality of network. In this proposed work, we present an efficient and secure key management framework (ESKM) for Mobile Ad-Hoc Networks that builds keys by applying a classified dissemination technique and an elemental multicast cluster group. In ESKM, the cluster group creates a view of the certification less key and provides key update process for all nodes, including the clusters themselves.
International journal of Computer Networks & Communications, 2014
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node has an ID which is evaluated from its public key and the messages that are sent are authenticated with a signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We present performance analysis to validate our claim.
Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007
This paper proposes a light weight solution for secure routing in integrated mobile ad hoc network (MANET)- Internet. The proposed framework addresses the following: i) application of IBC to ad hoc networks for efficient key management and for the distribution of pair-wise shared keys among the authenticated nodes; ii) providing secure Internet connectivity while the mobile node(MN) roams across different
Mobile Ad-hoc Network (MANET) is special types of mobile wireless network where the groups of mobile devices form a temporary network without any kind of an infrastructure. It is very usefully due to its self maintenance, self organizing and by reason of mobility of wireless communication. Two major issues are found in such kind of network performance and security. In mobile ad-hoc network there are so many attacks which reduced the performance of network. In this paper we have focus only active attacks in network layer. Ad Hoc On-Demand Vector Routing protocol is a reactive routing protocol for ad hoc networks that maintain routes only between nodes which want to communicate by using routing messages. AODV provide loop free routes during link breakages.SAODV are a secure routing protocol based on trust model for mobile ad-hoc network. For provide security and increase performance in MANET, we have applied SAODV protocol andour solution uses Hybrid Cryptography Technique (DES, RSA Algorithms) on SAODV. This paper presents comparison based on simulation of AODV, SAODV routing protocol of MANET with Different parameters like energy, packet delivery ratio and throughput. The proposed cryptographic routing algorithm is implemented through the NS2 network simulation environment.The outcome of our proposed method the energy is low; packet delivery ratio and throughput are high as compare to traditional method.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
IAEME PUBLICATION, 2018
International Journal of Engineering & Technology
Research Journal of Applied Sciences, Engineering and Technology, 2013
Advances in Applied Science Research, 2011
Wireless Communications and Mobile Computing
Handbook of Research on Progressive Trends in Wireless Communications and Networking
IOSR Journal of Computer Engineering, 2014
International Journal of Computer Applications, 2012
International Journal of Computer Science and …, 2011
Computing Research Repository, 2010
International Journal of Computer Applications, 2013
Journal of Systems and Software, 2007
IAEME PUBLICATION, 2013
International journal of computer application, 2018
Concurrency and Computation: Practice and Experience, 2010