A Novel Security Framework for Protecting Routes and Data In Mobile Ad Hoc Networks

Authors(2) :- K. Jaya Krishna, K. Sekhar

The flexibility and adaptability of Mobile Ad hoc Networks (MANETs) have made them extending noticeably in a wide extent of usage cases. To guarantee the security, secure steering conventions have been intended to secure the directing ways and application data. Regardless, these steering conventions simply guarantee course security or correspondence security, not both. Both secure directing and correspondence security steering conventions must be actualized to give full confirmation to the system. To address these above issues, a protected system, named ASF is proposed. The framework is planned to allow existing framework and directing conventions to play out their abilities, while giving node validation, get to control, and correspondence framework security. This paper shows a security structure for MANETs. Correlation comes to fruition taking a gander at ASF with IPsec which is given to display the proposed structures' propriety for correspondence security.

Authors and Affiliations

K. Jaya Krishna
Associate Professor Department of MCA, Qis collge of engineering &Technology, Ongole, Andhra Pradesh, India
K. Sekhar
Student. Department of MCA, Qis collge of engineering &Technology, Ongole, Andhra Pradesh, India

communication system security, mobile ad hoc networks, access control and authentication

  1. S. Zhao, R. Kent, and A. Aggarwal, "A key manage- ment and secure routing integrated framework for mobile ad-hoc networks," Ad Hoc Networks, vol. 11, no. 3, pp. 1046–1061, 2013.
  2. M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, "X. 509 internet public key infrastructure online certificate status protocol-ocsp," RFC 2560, Tech. Rep., 1999.
  3. N. Doraswamy and D. Harkins, IPSec: the new security standard for the Internet, intranets, and virtual private net- works. Prentice Hall Professional, 2003.
  4. A. Ghosh, R. Talpade, M. Elaoud, and M. Bereschinsky, "Securing ad-hoc networks using ip- sec," in Military Communications Conference, 2005.MIL- COM 2005.IEEE. IEEE, 2005, pp. 2948–2953.
  5. W. Ivancic, D. Stewart, D. Sullivan, and P. Finch, "AnEvaluation of Protocols for UAV Science Applications,"2011.
  6. E. Rescorla, "Diffie-hellman key agreement method," 1999.
  7. L. Harn, M. Mehta, and W.-J.Hsin, "Integrating diffie- hellman key exchange into the digital signature algo- rithm (dsa)," Communications Letters, IEEE, vol. 8, no. 3, pp. 198–200, 2004.
  8. H. Krawczyk and P. Eronen, "Hmac-based extract- and-expand key derivation function (hkdf)," 2010.
  9. A. Adekunle and S. Woodhead, "An aead crypto- graphic framework and tinyaead construct for secure wsn communication," in Wireless Advanced (WiAd), 2012. IEEE, 2012, pp. 1–5.
  10. A. R. McGee, U. Chandrashekhar, and S. H. Richman,"Using ITU-T x. 805 for Comprehensive Network SecurityAssessment and Planning", pp. 273–278, 2004.
  11. S. Zhao, R. Kent, and A. Aggarwal, "A key managementand secure routing integrated framework for mobile adhocnetworks," Ad Hoc Networks, vol. 11, no. 3, pp. 1046–1061, 2013.
  12. Darren Hurley-Smith, Jodie Wetherall and AndrewAdekunle "SUPERMAN: Security Using Pre-Existing Routingfor Mobile Ad-hoc Networks", IEEE Transactions on MobileComputing, pp. 1-15, 2016.
  13. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad-hoc Networks: Challenges and Solutions," Wireless Communications, IEEE, vol. 11, no. 1, pp. 38-47,2004.
  14. N. Garg and R. Mahapatra, "MANET Security Issues,"IJCSNS, vol. 9, no. 8, p. 241, 2009

The online JS minimizer tool helps you optimize your scripts for a better page loading speed.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 395-402
Manuscript Number : CSEIT1833366
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

K. Jaya Krishna, K. Sekhar, "A Novel Security Framework for Protecting Routes and Data In Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.395-402, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833366

Article Preview