Designing of Authentication Based Security in MANETs

Authors

  • Yumana Zaidi  M.Tech Scholer J.P.I.E.T, Meerut, Uttar Pradesh, India
  • Naveen Kumar  Department of computer science J.P.I.E.T, Meerut, Uttar Pradesh, India
  • Parul Saharavat  Department of computer science D.N. Polytechnique, Meerut, Uttar Pradesh, India

Keywords:

MANET, DSR, Key Management Service, Good Throughput, Evil Drop Rate.

Abstract

Current ad hoc routing protocols assume the networks to be benevolent and cannot cope with misbehavior of nodes. The misbehavior may be due to node being malicious or selfish to save the battery power. Thus, this work is of significant importance because now-a-days, new cryptographic schemes, such as threshold cryptography, are used to build a highly secure key management service that forms the core of security framework presented in this work. The CONFIDANT (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Network) on DSR (Dynamic Source Routing Protocol) is simulated in order to evaluate how the network performance changes as dynamic feedback mechanisms are introduced in an ad hoc network to control the node misbehavior. The above results have been used to design a trust based routing protocol that uses reputation data to provide dynamic feedback.

References

  1. David B. Johnson, David A. Maltz, Josh Broch. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. In Ad Hoc Networking, edited by Charles E. Perkins, chapter 5, pages 139-172. Addison-Wesley, 2001.
  2. Dellarocas C. The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. In Proceedings of Management Science 2003, Volume 49, No. 10, pages 1407–1424. INFORMS, October 2003.
  3. Levente Buttyan and Jean-Pierre Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. In Mobile Networks and Applications, Volume 8, Issue 5, pages 579 – 592. Kluwer Academic Publishers, 2003.
  4. H. Armbruster. Broadcast Communications and Its Realization with Broadband ISDN. IEEE Communications Magazine, Volume 25, No. 11, pages 8-19. November 1997.
  5. Jean-Pierre Hubaux, Levente Buttyan and Srdan Capkun. The Quest for Security in Mobile Ad hoc Networks. In Proceedings of International Symposium on Mobile Ad Hoc Networking & Computing, pages146-155. ACM Press, 2001
  6. Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. Technical report TR01-384, Department of Computer Science, Rice University, 2001.
  7. Sencun Zhu, Sanjeev Setia, Sushil Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., pages 62-72. ACM Press, October, 2003.
  8. Yih-Chun Hu, D. Johnson, A. Perrig. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), pages 30-40. Sep. 2003.
  9. J.R. Douceur. The Sybil attack. In Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS _02). Springer, March 2002.
  10. H. Deng, W. Li, and Dharma P. Aggarwal. "Routing Security in Ad Hoc Networks. In IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, pages 70-75. October 2002.
  11. L.M. Feeney and M. Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings of IEEE Conference on Computer Communications (IEEE InfoCom), Anchorage AK, USA, Vol. 3, pages 1548–1557. April 2001.
  12. Y. C. Hu, D.B. Johnson, and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pages. 3-13, June 2002

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
Yumana Zaidi, Naveen Kumar, Parul Saharavat, " Designing of Authentication Based Security in MANETs , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.61-65, July-August-2018.