A Novel Approach to Secure Route Discovery for Dynamic Source Routing in MANETs

Authors

  • Y. Lakshmi Kamakshi  PG Scholar, Department of MCA, St.Ann's College of Engineering and Technology, Chirala, Andhra Pradesh , India
  • Maddali M. V. M. Kumar  Assistant Professor, Department of MCA, St.Ann's College of Engineering and Technology, Chirala, Andhra Pradesh, India

Keywords:

Access Control, Authentication, Communication System Security, Mobile Ad Hoc Networks

Abstract

The adaptability and versatility of Mobile Ad hoc Networks (MANETs) have made them growing unmistakably in a wide extent of usage cases. To guarantee the security, secure routing protocols have been intended to secure the routing ways and application data. Regardless, these routing protocols simply guarantee course security or communication security, not both. Both secure routing and communication security routing protocols must be executed to give full affirmation to the system. To address these above issues, a safe structure, named ASF is proposed. The framework is planned to allow existing framework and routing protocols to play out their abilities, while giving node verification, get to control, and communication framework security. This paper shows a security structure for MANETs.

References

  1. R. McGee, U. Chandrashekhar, and S. H. Richman,"Using ITU-T x. 805 for Comprehensive Network SecurityAssessment and Planning", pp. 273-278, 2004.
  2. Zhao, R. Kent, and A. Aggarwal, "A key managementand secure routing integrated framework for mobile adhocnetworks," Ad Hoc Networks, vol. 11, no. 3, pp. 1046-1061, 2013.
  3. Darren Hurley-Smith, Jodie Wetherall and AndrewAdekunle "SUPERMAN: Security Using Pre-Existing Routingfor Mobile Ad-hoc Networks", IEEE Transactions on MobileComputing, pp. 1-15, 2016.
  4. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security inMobile Ad-hoc Networks: Challenges and Solutions,"Wireless Communications, IEEE, vol. 11, no. 1, pp. 38-47,2004.
  5. Smith, J. Wetherall, S. Woodhead, and A. Adekunle,"A Cluster-based Approach to Consensus basedDistributed Task Allocation," in Parallel, Distributed andNetwork-Based Processing (PDP), 2014 22nd EuromicroInternational Conference on. IEEE, 2014, pp. 428-431.
  6. Garg and R. Mahapatra, "MANET Security Issues,"IJCSNS, vol. 9, no. 8, p. 241, 2009.
  7. Ivancic, D. Stewart, D. Sullivan, and P. Finch, "AnEvaluation of Protocols for UAV Science Applications,"2011.
  8. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Securityin mobile ad hoc networks: challenges and solutions," Wireless Communications, IEEE, vol. 11, no. 1, pp. 38- 47, 2004.
  9. Garg and R. Mahapatra, "Manet security issues," IJCSNS, vol. 9, no. 8, p. 241, 2009.
  10. Ivancic, D. Stewart, D. Sullivan, and P. Finch, "An evaluation of protocols for uav science applications," 2011.
  11. Rescorla, "Diffie-hellman key agreement method," 1999.
  12. Harn, M. Mehta, and W.-J. Hsin, "Integrating diffie- hellman key exchange into the digital signature algorithm (dsa)," Communications Letters, IEEE, vol. 8,no. 3, pp. 198-200, 2004.
  13. Krawczyk and P. Eronen, "Hmac-based extract- and-expand key derivation function (hkdf)," 2010.
  14. A. Adekunle and S. Woodhead, "An aead crypto- graphic framework and tinyaead construct for securewsn communication," in Wireless Advanced (WiAd), 2012. IEEE, 2012, pp. 1-5.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Y. Lakshmi Kamakshi, Maddali M. V. M. Kumar, " A Novel Approach to Secure Route Discovery for Dynamic Source Routing in MANETs, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.885-891, January-February-2018.