Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks

Full Text (PDF, 538KB), PP.30-37

Views: 0 Downloads: 0

Author(s)

M.Madhurya 1,* B.Ananda Krishna 1 T.Subhashini 1

1. Department of ECE, Gudlavalleru Engineering College, Gudlavalleru, Krishna Dt, AP, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.02.05

Received: 11 Apr. 2013 / Revised: 12 Jul. 2013 / Accepted: 15 Sep. 2013 / Published: 8 Jan. 2014

Index Terms

MANET, Network Security, Encryption, Decryption, DDS

Abstract

Mobile Ad hoc Networks are wireless infrastructure less networks can be easily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance of the network by securing the data and to minimize the malicious nodes which disturb the stream of the network. Securing data is a critical task which can be achieved by cryptographic algorithms and disturbance detection plays as a crucial ingredient in any comprehensive security solution to address the threats. Hence a Novel Cryptographic Algorithm with a new Disturbance Detection System (DDS) has been proposed for Mobile Adhoc Networks. This method prevents the outside attacks to obtain any information from any data exchange in network and also use promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values. The proposed algorithm was implemented and simulated in the Glomosim and the result analysis proved that the performance of the network is increased.

Cite This Paper

M.Madhurya, B.Ananda Krishna, T.Subhashini, "Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.2, pp.30-37, 2014. DOI:10.5815/ijcnis.2014.02.05

Reference

[1]Subir Kumar Sharkar, T.G.Basavaraju, C.Puttamadappa, “Ad hoc mobile wireless networks, Principles, protocols and applications”, Auerbach PublicationsBoston, MA, USA©2007.
[2]H Yang, H Y.Luo, F Ye, S W.Lu and L Zhang, “Security in mobile ad hoc networks: challenges and solutions”, IEEE Wireless Communications, 2004, PP.38-47.
[3]DiaaSalama, HatemAbdual Kader and MohiyHadhoud, “Studying the effects of Most Common Encryption Algorithms”, International Arab Journal of e-Technology, Vol.2, No.1, January 2011.
[4]A.L.Jeeva, Dr.V.Palanisamy, K.Kanagaram, “Comparative analysis of performance efficiency and security measures of some encryption algorithms”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol.2, Issue 3, May-June 2012, PP.3033-3037.
[5]S.A.Razak, S.M.Furnell, P.J.Brooke, “Attacks against Mobile Ad hoc Networks Routing Protocols”, In Proceedings of 5th Annual Postgraduate Symposium on The Convergence of Telecommunications, Networking & Broadcasting, PGNET 2004, 2004.
[6]ShashiMehrotra Seth, Rajan Mishra, “Comparative Analysis of Encryption Algorithms For Data Communication”, IJCST Vol.2, Issue 2, June 2011.
[7]Pratap Chandra Mandal, “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish”, Journal of Global Research in Computer Science, Vol.3, No.8, August 2012.
[8]Gurjeevan Singh, Ashwani Kumar Singla, K.S.Sandha, “Throughput Analysis of Various Encryption Algorithms”, IJCST, Vol.2, Issue 3, September 2011.
[9]ChhayaNayak, “Performance of Various Algorithms Used in Cryptography”, IJMIE, Vol.2, Issue 7.
[10]Gulshan Kumar, MritunjayRai and Gang-Soo Lee, “Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement”, International Journal of Security and Its Applications, Vol.6, No.1, January 2012.
[11]Gurjeet Singh, “Security Threats and Maintenance in Mobile ad hoc networks”, IJECT, Vol.2, Issue 3, September 2011.
[12]Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad hoc Networks - (A Survey)”, The 17 th White House Papers Graduate Research In Informatics at Sussex, (2004), pp.1-23.
[13]Er.Deepinder Singh Wadhwa, Er.Tripatjot Singh Panag, “Performance Comparison of Single and Multipath Routing Protocols in Ad hoc Networks”, Int. J. Comp. Tech. Appl., (IJCTA), Vol2, Sept-Oct 2011, PP.1486-1496.
[14]Subash Chandra Mandhata, Dr.Surya Narayan Patro, “A Counter Measure to Black hole Attack on AODV Based Mobile Ad hoc Networks”, International Journal of Computer & Communication Technology(IJCCT), Vol.2, Issue 6, 2011.
[15]AmandeepKaur, “Trust Formalization In MANET Within Multichannel”, International Journal of Emerging Technology and Advanced Engineering (IJETAE), ISSN 2250-2459, Vol.2, Issue 6, June 2012.
[16]Adnan Nadeem and Michael P. Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE Communication Surveys & Tutorials, accepted for publication, 2013.
[17]Yao Yu, Lincong Zhang, “A Secure Clustering Algorithm in Mobile Ad hoc Networks”, IPCSIT, Vol.29, 2012.
[18]AmandeepMakkar, Bharat Bhushan, Shelja and Sunil Taneja, “Behavioral Study OF MANET Routing Protocols”, International Journal of Innovation, Management and Technology, Vol.2, No.3, June 2011.
[19]M. Madhurya, Dr. B. Ananda Krishna, “A Novel Cryptographic Algorithm for Data Security in MANETs”, International Journal of Engineering Research and Technology (IJERT), PP.26-30.
[20]W. Stallings, “Cryptography and network security 4th Edition”, prentice hall, 2005, PP.58-309.