A new Security approach for integrating wireless adhoc network using octant bit computation and routing test
Abstract
Ad hoc networks  are a kind of network that has no centralized body and in order to communicate with the nodes it has no fixed topology.In this paper we propose to use binary masking of octant bits and shared cryptography to secure message communication in ad-hoc network and we have proposed a minimized computational security scheme for wireless ad-hoc network based on shared information between source host and destination host .We also can focus on routing test before transferring packet because , no of packet increases due to binary masking technique. With the help of this method we make the virtual path between source and destination. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.
Keywords
References
Y. Xiao, X. Shen, and D.-Z. Du (Eds.), “A survey on attacks and countermeasures in mobile adhoc networksâ€, Wireless/Mobile Network Security, chapter 12, pp 1-38, Springer, 2006
Luiz A. DaSilva, Jeff H. Reed, William Newhall, Tutorial on “Ad hoc networks and automotive applicationsâ€, Mobile and Portable Radio Group, Virginia Polytechnic Institute and
State University, 2002
Abhijit Das, Soumya Sankar Basu ,Atal Chaudhuri†A Novel Security Scheme for Wireless Adhoc Network 978-1-4577-0787-2/11/$26.00 ©2011 IEEE
Li pengweiTeaching department of computer of Anyang normal university, Xu zhenqiang College of information science and engineering of He’nan university of technology†Security Enhancement of AODV against Internal Attacks, 978-1-4244- 7618-3 /10/$26.00 ©2010 IEEE
Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication,†International Journal of Computer Science and Security (IJCSS) Volume: 4 Issue: 3.
Sukla Banerjee , “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networksâ€, Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks ,â€Wireless/Mobile Network Security, Y. Xiao, X.
Shen, and D.-Z. Du (Eds.) pp, @ 2006 Springer.
Nishu Garg and R.P.Mahapatra, “MANET Security Issues ,†IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009.
N.Shanthi, Dr.Lganesan and Dr.K.Ramar , “Study of Different Attacks on Multicast Mobile Ad hoc Network,†Journal of Theoretical and Applied Information Technology.
V. Madhu Viswanatham and A.A. Chari, “An Approach for Detecting Attacks in MobileAdhoc Networks ,†Journal of Computer Science 4 (3): 245-251, 2008 ISSN 1549-3636 © 2008Science Publications.
Hoang Lan and Uyen Trang Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad hoc Networksâ€, Proceedings of ICNICONSMCL’06, 0-7695-2552-0/06@ 2006 IEEE.
S. Murphy, “Routing Protocol Threat Analysis,†Internet Draft, draft-murphy-threat-00.txt,Octomber 2002.
P. Papadimitratos and Z.J.Haas, “Securing the Routing Infrastructureâ€, IEEE Communications, vol. 10, no. 40. Octomber 2002, pp. 60-68. 10] C. PerkinsAd hoc On-Demand
Distance Vector (AODV) Routing RFC3561[ S] 2003-7.
Zhu Daofei, Wang Dongyan, Liu xinran. Secure Routing Protocols for ad hoc Networks: a Survey[J]. Computer Engineering and Applications, 2005,(27):116-119.
. Mahendra Kumar* Ajay Bhushan Amit Kumar†A Study of wireless Ad-Hoc Network attack and Routing Protocol attack†International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X Volume 2, Issue 4, April 2012
. Attend Seminor and represented topic “a review on preventing aodv from black hole attackâ€.
http://www.cnsr.ictas.vt.edu/publication/INFOCOM05_Zhang.pdf
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â