NSF: A Novel Secure Framework for Protecting Route and Data in Mobile Ad-hoc Network

Authors

  • Lavanya N N  M.tech in CS&E, VTU PG Centre, Mysuru, Karnataka, India
  • Pushpalatha R  Assistant professor, DOS in CS&E, VTU PG Centre, Mysuru, Karnataka, India

Keywords:

access control, authentication, communication system security, mobile ad hoc networks.

Abstract

The adaptability and versatility of Mobile Ad hoc Networks (MANETs) have made them expanding prominently in a wide scope of utilization cases. To ensure the security, secure routing protocols have been designed to secure the routing paths and application information. In any case, these routing protocols just ensure route security or communication security, not both. Both secure routing and communication security routing protocols must be implemented to give full assurance to the network. To address these above issues, a secure framework, named NSF is proposed. The system is intended to permit existing system and routing protocols to play out their capacities, while giving node authentication, access control, and communication system security. This paper exhibits a security structure for MANETs. Comparison comes about looking at NSF with IPsec which is given to exhibit the proposed structures’ appropriateness for communication security.

References

  1. P S. Kiran, “Protocol architecture for mobile ad hoc networks,” inProc. IEEE Int. Ad. Comput. Conf., 2009, pp. 2112–2117.
  2. Chandra, “Ontology for manet security threats,” in Proc. 2nd Nat. Conf. Netw. Eng., 2005, pp. 171–117.
  3. K Rai, R. R. Tewari, and S. K. Upadhyay,
  4. “Different types of attacks on integrated manetinternet communication,” Int. J.Comput. Sci. Secur., vol. 4, no. 3, pp. 265–274, 2010.
  5. D Smith, J. Wetherall, S. Woodhead, and A. Adekunle, “A cluster- based approach to consensus based distributed task allocation,” in Proc. 22nd Euromicro Int. Conf. Parallel, Distrib. Netw.-Based Process., 2014, pp. 428– 431.
  6. I D. Chakeres and E. M. Belding-Royer, “Aodv routing protocol implementation design,” in Proc. 24th Int. Conf. Distrib. Comput. Syst. Workshops, 2004, pp. 698– 703.[6] T. Clausen and P. Jacquet, “Optimized link state routing protocol (OLSR),” RFC 3626, Oct. 2003, Doi: 10.17487/RFC3626.
  7. M Hyland, B. E. Mullins, R. O. Baldwin, and M. Temple, “Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles,” in Proc. 21st Int. Conf. Adv. Inf. Netw. Appl. Workshops, 2007, vol. 2, pp. 249–256.
  8. J Pojda, A. Wolff, M. Sbeiti, and C. Wietfeld, “Performance analysis of mesh routing protocols for uav swarming applications,” in Proc. 8th Int. Symp. Wireless Commun. Syst., 2011, pp. 317– 321.
  9. H Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless Commun., vol. 11, no. 1, pp. 38–47, Feb. 2004.
  10. Garg and R. Mahapatra, “Manet security issues,” Int. J. Comput.Sci. Netw. Secur., vol. 9, no. 8, pp. 241–246, 2009.

Downloads

Published

2018-05-08

Issue

Section

Research Articles

How to Cite

[1]
Lavanya N N, Pushpalatha R, " NSF: A Novel Secure Framework for Protecting Route and Data in Mobile Ad-hoc Network , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.84-88, May-June-2018.