A new Security approach for integrating wireless adhoc network using octant bit computation and routing test

Sushmita Silwal, Anu Sharma

Abstract


Ad hoc networks  are a kind of network  that has no centralized body and  in order  to  communicate with the nodes it has no fixed topology.In this paper we propose to use binary masking of octant bits and shared cryptography to secure message communication in ad-hoc network and we have proposed a minimized computational security scheme for wireless ad-hoc network based on shared information between source host and destination host .We also can focus on routing test before transferring packet because , no of packet increases  due to binary masking technique. With the help of this method we make the virtual path between source and destination. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.


Keywords


Ad-hoc Network, Security threats, virtual path, computational.

References


Y. Xiao, X. Shen, and D.-Z. Du (Eds.), “A survey on attacks and countermeasures in mobile adhoc networksâ€, Wireless/Mobile Network Security, chapter 12, pp 1-38, Springer, 2006

Luiz A. DaSilva, Jeff H. Reed, William Newhall, Tutorial on “Ad hoc networks and automotive applicationsâ€, Mobile and Portable Radio Group, Virginia Polytechnic Institute and

State University, 2002

Abhijit Das, Soumya Sankar Basu ,Atal Chaudhuri†A Novel Security Scheme for Wireless Adhoc Network 978-1-4577-0787-2/11/$26.00 ©2011 IEEE

Li pengweiTeaching department of computer of Anyang normal university, Xu zhenqiang College of information science and engineering of He’nan university of technology†Security Enhancement of AODV against Internal Attacks, 978-1-4244- 7618-3 /10/$26.00 ©2010 IEEE

Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication,†International Journal of Computer Science and Security (IJCSS) Volume: 4 Issue: 3.

Sukla Banerjee , “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networksâ€, Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.

Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks ,â€Wireless/Mobile Network Security, Y. Xiao, X.

Shen, and D.-Z. Du (Eds.) pp, @ 2006 Springer.

Nishu Garg and R.P.Mahapatra, “MANET Security Issues ,†IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009.

N.Shanthi, Dr.Lganesan and Dr.K.Ramar , “Study of Different Attacks on Multicast Mobile Ad hoc Network,†Journal of Theoretical and Applied Information Technology.

V. Madhu Viswanatham and A.A. Chari, “An Approach for Detecting Attacks in MobileAdhoc Networks ,†Journal of Computer Science 4 (3): 245-251, 2008 ISSN 1549-3636 © 2008Science Publications.

Hoang Lan and Uyen Trang Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad hoc Networksâ€, Proceedings of ICNICONSMCL’06, 0-7695-2552-0/06@ 2006 IEEE.

S. Murphy, “Routing Protocol Threat Analysis,†Internet Draft, draft-murphy-threat-00.txt,Octomber 2002.

P. Papadimitratos and Z.J.Haas, “Securing the Routing Infrastructureâ€, IEEE Communications, vol. 10, no. 40. Octomber 2002, pp. 60-68. 10] C. PerkinsAd hoc On-Demand

Distance Vector (AODV) Routing RFC3561[ S] 2003-7.

Zhu Daofei, Wang Dongyan, Liu xinran. Secure Routing Protocols for ad hoc Networks: a Survey[J]. Computer Engineering and Applications, 2005,(27):116-119.

. Mahendra Kumar* Ajay Bhushan Amit Kumar†A Study of wireless Ad-Hoc Network attack and Routing Protocol attack†International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X Volume 2, Issue 4, April 2012

. Attend Seminor and represented topic “a review on preventing aodv from black hole attackâ€.

http://www.cnsr.ictas.vt.edu/publication/INFOCOM05_Zhang.pdf


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â