Designing of Authentication Based Security in MANETs

Authors(3) :-Yumana Zaidi, Naveen Kumar, Parul Saharavat

Current ad hoc routing protocols assume the networks to be benevolent and cannot cope with misbehavior of nodes. The misbehavior may be due to node being malicious or selfish to save the battery power. Thus, this work is of significant importance because now-a-days, new cryptographic schemes, such as threshold cryptography, are used to build a highly secure key management service that forms the core of security framework presented in this work. The CONFIDANT (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Network) on DSR (Dynamic Source Routing Protocol) is simulated in order to evaluate how the network performance changes as dynamic feedback mechanisms are introduced in an ad hoc network to control the node misbehavior. The above results have been used to design a trust based routing protocol that uses reputation data to provide dynamic feedback.

Authors and Affiliations

Yumana Zaidi
M.Tech Scholer J.P.I.E.T, Meerut, Uttar Pradesh, India
Naveen Kumar
Department of computer science J.P.I.E.T, Meerut, Uttar Pradesh, India
Parul Saharavat
Department of computer science D.N. Polytechnique, Meerut, Uttar Pradesh, India

MANET, DSR, Key Management Service, Good Throughput, Evil Drop Rate.

  1. David B. Johnson, David A. Maltz, Josh Broch. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. In Ad Hoc Networking, edited by Charles E. Perkins, chapter 5, pages 139-172. Addison-Wesley, 2001.
  2. Dellarocas C. The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. In Proceedings of Management Science 2003, Volume 49, No. 10, pages 1407–1424. INFORMS, October 2003.
  3. Levente Buttyan and Jean-Pierre Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. In Mobile Networks and Applications, Volume 8, Issue 5, pages 579 – 592. Kluwer Academic Publishers, 2003.
  4. H. Armbruster. Broadcast Communications and Its Realization with Broadband ISDN. IEEE Communications Magazine, Volume 25, No. 11, pages 8-19. November 1997.
  5. Jean-Pierre Hubaux, Levente Buttyan and Srdan Capkun. The Quest for Security in Mobile Ad hoc Networks. In Proceedings of International Symposium on Mobile Ad Hoc Networking & Computing, pages146-155. ACM Press, 2001
  6. Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. Technical report TR01-384, Department of Computer Science, Rice University, 2001.
  7. Sencun Zhu, Sanjeev Setia, Sushil Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., pages 62-72. ACM Press, October, 2003.
  8. Yih-Chun Hu, D. Johnson, A. Perrig. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), pages 30-40. Sep. 2003.
  9. J.R. Douceur. The Sybil attack. In Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS _02). Springer, March 2002.
  10. H. Deng, W. Li, and Dharma P. Aggarwal. "Routing Security in Ad Hoc Networks. In IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, pages 70-75. October 2002.
  11. L.M. Feeney and M. Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings of IEEE Conference on Computer Communications (IEEE InfoCom), Anchorage AK, USA, Vol. 3, pages 1548–1557. April 2001.
  12. Y. C. Hu, D.B. Johnson, and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pages. 3-13, June 2002

Publication Details

Published in : Volume 3 | Issue 6 | July-August 2018
Date of Publication : 2018-07-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 61-65
Manuscript Number : CSEIT183615
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Yumana Zaidi, Naveen Kumar, Parul Saharavat, "Designing of Authentication Based Security in MANETs ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.61-65, July-August.2018
URL : http://ijsrcseit.com/CSEIT183615

Follow Us

Contact Us