Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A Secure and Authentication Based Mechanism in Zone Routing Protocol

Author : B.Kusuma Kumari 1 U.D.Prasan 2

Date of Publication :7th April 2016

Abstract: Data confidentiality and malicious node detection are the major factors while transmission of data in zone based routing protocol. We are proposing geo code based approach for identification of the nodes and authentication can be verified by key distribution centre with verification shares, secure session based group key can be generated for every transmission. Our work identifies the malicious nodes, authenticate the genuine users, encode and decode the data transmitted between source node to destination and it can be decrypted only at destination node even though transmission done through intermediate nodes.

Reference :

    1. KamanashisBiswas and Md. Ali, “Security threats in Mobile ad hoc networks”, University essay from BlekingeTeknisha Ho gskola/Sektionen for Teknik (TEK), 2007.
    2. M Poturalski, P. Papadimitratos, J. Hubaux, “Secure Neighbor Discovery in Wireless Networks,” In Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, 2008.
    3. Jameela Al-Jaroodi, “Security Issues In Wireless Mobile Ad Hoc Networks (MANET)”, Technical Report TR02-10- 07, University of Nebraska-Lincoln, 2002.
    4. William Stallings, “Cryptography and Network Security: Principles And Practices”, 3rd Edition, Prentice Hall 2003, ISBN: 0-13-091429-0.
    5. Klas Fokine, Key Management in Ad Hoc Networks, Master Thesis, Linkping University, 2002. http://www.liu.se/.
    6. ITU-T Recommendation X.509, ―Public-key and attribute certificate frameworks‖, August 2005.
    7. C. Siva Ram Murthy and B.S. Manoj, ―Ad Hoc Wireless Networks: Architectures‖, book, ISBN 0-13- 147046-X, first printing, 2004.
    8. Xing Fei; Wang Wenye, ―Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks‖, MILCOM 2006, Oct. 2006, pp. 1 – 7.
    9. Bo Sun, Kui Wu, Yang Xiao, and Ruhai Wang, ―Integration of Mobility and Intrusion detection for wireless ad hoc networks‖, International Journal of Communication Systems, pp. 695 – 721, 2007
    10. Y. Zhang, W. Lee, and Y. Huang, ―Intrusion Detection Techniques for Mobile Wireless Networks‖, ACM Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.

Recent Article