A Novel Security Framework for Protecting Routes and Data In Mobile Ad Hoc Networks

Authors

  • K. Jaya Krishna  Associate Professor Department of MCA, Qis collge of engineering &Technology, Ongole, Andhra Pradesh, India
  • K. Sekhar  Student. Department of MCA, Qis collge of engineering &Technology, Ongole, Andhra Pradesh, India

Keywords:

communication system security, mobile ad hoc networks, access control and authentication

Abstract

The flexibility and adaptability of Mobile Ad hoc Networks (MANETs) have made them extending noticeably in a wide extent of usage cases. To guarantee the security, secure steering conventions have been intended to secure the directing ways and application data. Regardless, these steering conventions simply guarantee course security or correspondence security, not both. Both secure directing and correspondence security steering conventions must be actualized to give full confirmation to the system. To address these above issues, a protected system, named ASF is proposed. The framework is planned to allow existing framework and directing conventions to play out their abilities, while giving node validation, get to control, and correspondence framework security. This paper shows a security structure for MANETs. Correlation comes to fruition taking a gander at ASF with IPsec which is given to display the proposed structures' propriety for correspondence security.

References

  1. S. Zhao, R. Kent, and A. Aggarwal, "A key manage- ment and secure routing integrated framework for mobile ad-hoc networks," Ad Hoc Networks, vol. 11, no. 3, pp. 1046–1061, 2013.
  2. M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, "X. 509 internet public key infrastructure online certificate status protocol-ocsp," RFC 2560, Tech. Rep., 1999.
  3. N. Doraswamy and D. Harkins, IPSec: the new security standard for the Internet, intranets, and virtual private net- works. Prentice Hall Professional, 2003.
  4. A. Ghosh, R. Talpade, M. Elaoud, and M. Bereschinsky, "Securing ad-hoc networks using ip- sec," in Military Communications Conference, 2005.MIL- COM 2005.IEEE. IEEE, 2005, pp. 2948–2953.
  5. W. Ivancic, D. Stewart, D. Sullivan, and P. Finch, "AnEvaluation of Protocols for UAV Science Applications,"2011.
  6. E. Rescorla, "Diffie-hellman key agreement method," 1999.
  7. L. Harn, M. Mehta, and W.-J.Hsin, "Integrating diffie- hellman key exchange into the digital signature algo- rithm (dsa)," Communications Letters, IEEE, vol. 8, no. 3, pp. 198–200, 2004.
  8. H. Krawczyk and P. Eronen, "Hmac-based extract- and-expand key derivation function (hkdf)," 2010.
  9. A. Adekunle and S. Woodhead, "An aead crypto- graphic framework and tinyaead construct for secure wsn communication," in Wireless Advanced (WiAd), 2012. IEEE, 2012, pp. 1–5.
  10. A. R. McGee, U. Chandrashekhar, and S. H. Richman,"Using ITU-T x. 805 for Comprehensive Network SecurityAssessment and Planning", pp. 273–278, 2004.
  11. S. Zhao, R. Kent, and A. Aggarwal, "A key managementand secure routing integrated framework for mobile adhocnetworks," Ad Hoc Networks, vol. 11, no. 3, pp. 1046–1061, 2013.
  12. Darren Hurley-Smith, Jodie Wetherall and AndrewAdekunle "SUPERMAN: Security Using Pre-Existing Routingfor Mobile Ad-hoc Networks", IEEE Transactions on MobileComputing, pp. 1-15, 2016.
  13. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad-hoc Networks: Challenges and Solutions," Wireless Communications, IEEE, vol. 11, no. 1, pp. 38-47,2004.
  14. N. Garg and R. Mahapatra, "MANET Security Issues,"IJCSNS, vol. 9, no. 8, p. 241, 2009

The online JS minimizer tool helps you optimize your scripts for a better page loading speed.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
K. Jaya Krishna, K. Sekhar, " A Novel Security Framework for Protecting Routes and Data In Mobile Ad Hoc Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.395-402, March-April-2018.