Author : Ms Raksha R. Nadgir 1
Date of Publication :7th May 2016
Abstract: In past few decades, due to defection of wired technology to the wireless era. Technology has got a revolution in the networking domain. The decentralized way in adhoc networks makes it vulnerable to attacks. If there is no centralized authority for such networks, which are not area bound then security becomes a major issue. These kind of open systems where in nodes are remotely distributed makes Mobile Adhoc NETwork most prone to attacks so security is very much needed for this technology. This paper proposes a technique which uses key management and trust based system to make MANET secure. This model focuses on providing security to network as well as information without compromising on its performance
Reference :
-
- Khatri, Pallavi. "Using identity and trust with key management for achieving security in Ad hoc Networks." In Advance Computing Conference (IACC), 2014 IEEE International, pp. 271-275. IEEE, 2014.
- Chahal, Anju, Anuj Kumar, and Anuradha Rani. "SECURE KEY MANAGEMENT IN AD-HOC NETWORK: A REVIEW." International Journal of Advances in Engineering & Technology 7, no. 3 p: 1009.2014 july
- Ammayappan, Kavitha, V. N. Sastry, and Atul Negi. "Authentication and Dynamic Key Management Protocol based on certified tokens for MANETs." In Global Mobile Congress 2009, pp. 1-6. IEEE, 2009.
- Govindan, Kannan, and Prasant Mohapatra. "Trust computations and trust dynamics in mobile adhoc networks: a survey." Communications Surveys & Tutorials, IEEE 14, no. 2 pp: 279-298.2012
- Basarkod, P. I., and SunilKumar S. Manvi. "Node movement stability and congestion aware anycast routing in mobile ad hoc networks." In Advance Computing Conference (IACC), 2014 IEEE International, pp. 124-131. IEEE, 2014
- Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. "EAACK—a secure intrusion-detection system for MANETs." Industrial Electronics, IEEE Transactions on 60, no. 3 pp: 1089-1098.2013
- Rafsanjani, Marjan Kuchaki, Ali Movaghar, and Faroukh Koroupi. "Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes." World Academy of Science, Engineering and Technology 20 pp: --------351-355.2008.
- Johnson, David B., and David A. Maltz. "Dynamic source routing in ad hoc wireless networks." In Mobile computing, pp. 153-181. Springer US, 1996.
- Akbani, Rehan, Turgay Korkmaz, and G. V. S. Raju. "Mobile ad-hoc networks security." In Recent Advances in Computer Science and Information Engineering,, Springer Berlin Heidelberg, pp. 659-666., 2012.
- Yang, Hao, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang. "Security in mobile ad hoc networks: challenges and solutions." Wireless Communications, IEEE 11, no. 1 pp: 38- 47,2004.
- Li, Wenjia, and Anupam Joshi. "Security issues in mobile ad hoc networks-a survey." Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County pp: 1-23,2008
- El-Sayed, Ayman. "Clustering Based Group Key Management for MANET." In Advances in Security of Information and Communication Networks, Springer Berlin Heidelberg ,pp. 11-26., 2013.
- Horie, Wataru, and Yukitoshi Sanada. "Novel routing schemes based on location information for UWB adâ€hoc networks." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 88, no. 2,pp 22-30 (2005).
- Pakzad, Farzaneh, and Marjan Kuchaki Rafsanjani. "Intrusion Detection Techniques for Detecting Misbehaving Nodes." Computer and Information Science 4, no. 1 pp. 151,2011.