Efficient Secure Framework For Providing Security In n/w Layer For MANET

Jagadam Lovaraju

Abstract


SUPERMAN lectures the badly-behaved of unified MANET communication haven. It outfits a Virtual Closed Network architecture to shelter both network and application data. This is in disparity with the approaches suggested in previous work, which application on protective definite communication based services. The charter is deliberate to countenance existing network and routing protocols to execute their functions, at the same time as providing node authentication, access control, and communication security mechanisms. This gifts a original safety framework for MANETs, SUPERMAN. Simulation results likening SUPERMAN with IPsec, SAODV and SOLSR are if to prove the future frameworks appropriateness for wireless communication security.


References


P.S. Kiran, “Protocol architecture for mobile ad hoc networks,” 2009 IEEE International Advance Computing Conference (IACC 2009), 2009.

A. Chandra, “Ontology for manet security threats,” PROC. NCON, Krishnankoil, Tamil Nadu, pp. 171–17, 2005.

A. K. Rai, R. R. Tewari, and S. K. Upadhyay, “Different types of attacks on integrated manet-internet communication,” International Journal of Computer Science and Security, vol. 4, no. 3, pp. 265–274, 2010.

D. Smith, J. Wetherall, S. Woodhead, and A. Adekunle, “A cluster-based approach to consensus based distributed task allocation,” in Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on. IEEE, 2014, pp. 428–431.

I. D. Chakeres and E. M. Belding-Royer, “Aodv routing protocol implementation design,” in Distributed Computing Systems Workshops, 2004. Proceedings.24th International Conference on. IEEE, 2004, pp. 698–703.

T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, L. Viennotet al., “Optimized link state routing protocol (olsr),” 2003.

M. Hyland, B. E. Mullins, R. O. Baldwin, and M. A. Temple, “Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles,” in Advanced Information Networking and Applications Workshops, 2007, AINAW’07. 21st International Conference on, vol. 2. IEEE, 2007, pp. 249–256.

J. Pojda, A. Wolff, M. Sbeiti, and C. Wietfeld, “Performance analysis of mesh routing protocols for uav swarming applications,” in Wireless Communication Systems (ISWCS), 2011 8th International Symposium on. IEEE, 2011, pp. 317–321.

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wireless Communications, IEEE, vol. 11, no. 1, pp. 38– 47, 2004.

N. Garg and R. Mahapatra, “Manet security issues,” IJCSNS, vol. 9, no. 8, p. 241, 2009.

W. Ivancic, D. Stewart, D. Sullivan, and P. Finch, “An evaluation of protocols for uav science applications,” 2011.

A. R. McGee, U. Chandra shekhar, and S. H. Richman, “Using itu-t x. 805 for comprehensive network security assessment and planning,” in Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004, 11th International. IEEE, 2004, pp. 273–278.

M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106–107, 2002

F. Hong, L. Hong, and C. Fu, “Secure olsr,” in Advanced Information Networking and Applications, 2005. AINA 2005.19th International Conference on, vol. 1. IEEE, 2005, pp. 713–718.

A. Hafslund, A. Tønnesen, R. B. Rotvik, J. Andersson, and +Ø. Kure, “Secure extension to the olsr protocol,” in Proceedings of the OLSR Interop and Workshop, San Diego, 2004.

Darren Hurley-Smith, Jodie Wetherall and Andrew Adekunle, SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc

Networks,2017


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.