Author : S. Muneeswari 1
Date of Publication :1st June 2018
Abstract: MANET is one of the wireless Ad Hoc networks with wireless nodes under mobility. Due to its configuration and maintenance capabilities arises the security challenges in MANET. In this paper, an efficient routing with security based protocol towards mobile ad hoc networks is proposed. To provide security against malicious attacks an effective Cluster Based Zone Allocation (CBZA) algorithm is presented. Through NS2 simulations, the proposed CBZA method is compared with the MDR protocol. The proposed method achieves better reliability along with reduced energy consumption and improve the security also. Key generation is used for point to point and end to end communication achieved by Elliptic Curve Cryptography (ECC), is more scalable and requires lesser memory for storing keys. Also, the simulation results promises the detection of misbehaviour nodes and improved security
Reference :
-
- Secure Routing Protocols for Mobile Ad HocNetworks”,H.Moudni.,M.Errouidi.,H.Mounc if.,B.E.Hadadi, 2016.
- Performance Analysis of Routing Protocols under Different Types of Attacks in MANETs”, Lakshit Prashar., Raj Kamal Kapur, 2016.
- A Role-Based Approach to Secure Routing in Wireless Ad-Hoc Networks”, E.Shcherba.,V.I.Nikonov, 2016
- A Trust-Based Scheme against Packet Dropping Attacks in MANETs”, Sachi N.Shah, Rutvij H. Jhaveri, 2016.
- Analysis of Attacks on Routing Protocols in MANETs”, Raj Kamal Kapur.,Sunil Kumar, 2015.
- An Integrated Key Management and Secure Routing Framework for Mobile Ad-hoc Networks”, Shushan Zhao.,Robert D. Kent., Akshai Aggarwa, 2012.
- New ID-based and Threshold Key Distribution Protocol in MANET Using Multi Signcryption Scheme“,Zhang Chuanrong, Zhang Yuqing, 2009.
- Threshold Key Management Protocol in Mobile Ad Hoc Networks Using an ID-based Signcryption Scheme”, Zhang Chuanrong., Xiao Hong, 2009.
- “Protocol Architecture for Mobile Ad Hoc Networks”,P.Sai Kiran, 2009.
- Secure Routing in Integrated Mobile Ad hoc Network (MANET)- Internet”,K.Ramanarayana.,Lillykutty Jacob, 2007.