NSF: A Novel Secure Framework for Protecting Route and Data in Mobile Ad-hoc Network

Authors(2) :-Lavanya N N, Pushpalatha R

The adaptability and versatility of Mobile Ad hoc Networks (MANETs) have made them expanding prominently in a wide scope of utilization cases. To ensure the security, secure routing protocols have been designed to secure the routing paths and application information. In any case, these routing protocols just ensure route security or communication security, not both. Both secure routing and communication security routing protocols must be implemented to give full assurance to the network. To address these above issues, a secure framework, named NSF is proposed. The system is intended to permit existing system and routing protocols to play out their capacities, while giving node authentication, access control, and communication system security. This paper exhibits a security structure for MANETs. Comparison comes about looking at NSF with IPsec which is given to exhibit the proposed structures’ appropriateness for communication security.

Authors and Affiliations

Lavanya N N
M.tech in CS&E, VTU PG Centre, Mysuru, Karnataka, India
Pushpalatha R
Assistant professor, DOS in CS&E, VTU PG Centre, Mysuru, Karnataka, India

access control, authentication, communication system security, mobile ad hoc networks.

  1. P S. Kiran, “Protocol architecture for mobile ad hoc networks,” inProc. IEEE Int. Ad. Comput. Conf., 2009, pp. 2112–2117.
  2. Chandra, “Ontology for manet security threats,” in Proc. 2nd Nat. Conf. Netw. Eng., 2005, pp. 171–117.
  3. K Rai, R. R. Tewari, and S. K. Upadhyay,
  4. “Different types of attacks on integrated manetinternet communication,” Int. J.Comput. Sci. Secur., vol. 4, no. 3, pp. 265–274, 2010.
  5. D Smith, J. Wetherall, S. Woodhead, and A. Adekunle, “A cluster- based approach to consensus based distributed task allocation,” in Proc. 22nd Euromicro Int. Conf. Parallel, Distrib. Netw.-Based Process., 2014, pp. 428– 431.
  6. I D. Chakeres and E. M. Belding-Royer, “Aodv routing protocol implementation design,” in Proc. 24th Int. Conf. Distrib. Comput. Syst. Workshops, 2004, pp. 698– 703.[6] T. Clausen and P. Jacquet, “Optimized link state routing protocol (OLSR),” RFC 3626, Oct. 2003, Doi: 10.17487/RFC3626.
  7. M Hyland, B. E. Mullins, R. O. Baldwin, and M. Temple, “Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles,” in Proc. 21st Int. Conf. Adv. Inf. Netw. Appl. Workshops, 2007, vol. 2, pp. 249–256.
  8. J Pojda, A. Wolff, M. Sbeiti, and C. Wietfeld, “Performance analysis of mesh routing protocols for uav swarming applications,” in Proc. 8th Int. Symp. Wireless Commun. Syst., 2011, pp. 317– 321.
  9. H Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless Commun., vol. 11, no. 1, pp. 38–47, Feb. 2004.
  10. Garg and R. Mahapatra, “Manet security issues,” Int. J. Comput.Sci. Netw. Secur., vol. 9, no. 8, pp. 241–246, 2009.

Publication Details

Published in : Volume 4 | Issue 6 | May-June 2018
Date of Publication : 2018-05-08
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 84-88
Manuscript Number : CSEIT184618
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Lavanya N N, Pushpalatha R, "NSF: A Novel Secure Framework for Protecting Route and Data in Mobile Ad-hoc Network ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.84-88, May-June-2018.
Journal URL : http://ijsrcseit.com/CSEIT184618

Article Preview