Open Access   Article Go Back

New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET

Priya 1 , Yogesh Kumar2 , Rahul Rishi3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1169-1175, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.11691175

Online published on Jul 31, 2018

Copyright © Priya, Yogesh Kumar, Rahul Rishi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Priya, Yogesh Kumar, Rahul Rishi, “New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1169-1175, 2018.

MLA Style Citation: Priya, Yogesh Kumar, Rahul Rishi "New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET." International Journal of Computer Sciences and Engineering 6.7 (2018): 1169-1175.

APA Style Citation: Priya, Yogesh Kumar, Rahul Rishi, (2018). New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET. International Journal of Computer Sciences and Engineering, 6(7), 1169-1175.

BibTex Style Citation:
@article{Kumar_2018,
author = {Priya, Yogesh Kumar, Rahul Rishi},
title = {New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1169-1175},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2577},
doi = {https://doi.org/10.26438/ijcse/v6i7.11691175}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.11691175}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2577
TI - New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - Priya, Yogesh Kumar, Rahul Rishi
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1169-1175
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
275 268 downloads 248 downloads
  
  
           

Abstract

An ADHOC arranges is an accumulation of remote portable hubs or hosts framing an impermanent system without necessity of any settled framework. In such a domain, to forward a packet from source host to goal have require an on-way host to forward information bundles. ADHOC frameworks rely upon multi-hop guiding from a source to an objective center point or centers. These frameworks have various impediments in light of helplessness of radio interface and its requirements .Problems faced by communication system due to lack security, Attacks has shown that if security is not included in the basic system at the beginning stage, then malicious nodes/users would exploit in the network. With this research work, New Security framework for prevention from suspicious nodes in the mobile ADHOC network is represented. This new security framework will contain efficient approach that will detect, isolate and prevent data from suspicious node by using scattering techniques. This will lead us to propose new security in MANET communication.

Key-Words / Index Term

MANET, Wireless Network, Protocol, Secure Communication, Security

References

[1] Al-Shurman, M., Yoo, S. M., & Park, S. “Black hole attack in mobile ad hoc networks” , In ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference. 2014
[2] Balachandran, R. K., Ramamurthy, B., Zou, X., &Vinodchandran, N, “An efficient key agreement scheme for secure group communications in wireless ad hoc networks” In IEEE ICC. 2005
[3] Capkun, S., Buttyan, L., & Hubaux, J. P. ,”Sector: Secure tracking of node encounters in multi-hop wireless networks.” In ACM workshop on security of ad hoc and sensor networks. 2003
[4] Cordasco, J., & Wetzel, S., “Cryptographic vs. trust-based methods for manet routing security”. Electronic Notes in Theoretical Computer Science, 197(2). 2008
[5] Dabideen, S., & Garcia-Luna-Aceves, J.,”Ordering in time: A new routing approach for wireless networks.” In Proceedings of IEEE MASS. 2010
[6] Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02), ACM, November 2002.
[7] K. Lu, Y. Qian, M. Guizani, and H.-H. Chen, “A framework for a distributed key management scheme in heterogeneous wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 2, 2008.
[8] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proceedings of the IEEE Symposium on Security And Privacy, May 2003.
[9] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 2, 2005.
[10] D. Liu, P. Ning, and L. I. Rongfang, “Establishing pairwise keys in distributed sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 1, 2005.
[11] Khatri P, Rajput M, Shastri A, Solanki K, “Performance study of ad-hoc reactive routing protocols” J ComputSci 6(10):1159–1163, 2010
[12] Medadian M, Yektaie MH, Rahmani AM,”Combat with black hole attack in AODV routing protocol in MANET”. In: First asianhimalayas international conference on internet, IEEE Press, New York, 2009
[13] Gwertzman, J.S. and M. Seltzer. “The Case for Geographical Push-Caching” Workshop on Hot Operating Systems. 1995.
[14] Kleinrock, L., “Nomadic Computing (Keynote Address).” In Int. Conf. on Mobile Computing and Networking., Berkeley, CA. 1995
[15] Amir, E., S. McCanne, and H. Zhang. A n Application Level Video Gateway. inA C M Multimedia ‘95. 1995. San Francisco, CA.
[16] Le, M.T., F. Burghardt, and J. Rabaey, ”Software Architecture of the Infopad System.” In Mobidata Workshop on Mobile and Wireless Information Systems, New Brunswick, NJ. 1994
[17] Pasquale, J.C., et al., ”Filter Propagation in Dissemination Trees: Trading Off Bandwidth and Processing in Continuous Media Networks.” In 4th Intl. Workshop on Network and Operating System Support for Digital Audio and Video. 1993.
[18] Clark, D.D. “The Design Philosophy of the DARPA Internet Protocls”. In ACM Sigcomm Symposium. Stanford, CA. 1988
[19] Von Eicken, T., et al.”Active Messages: A Mechanism for Integrated Communication and Computation”. In 19th Int. Symp. on Computer Architecture. Gold Coast, Australia. 1992
[20] Agarwal, A., et al., “The MIT Alewife Machine: Architecture and Performance”. In 22nd Int. Symp. On Computer Architecture (ISCA ‘95). 1995.
[21] O’Malley, S.W. and L.L. Peterson, ”A Dynamic Network Architecture”. ACM Transactions on Computer Systems, 10(2) p. 110-143. 1992
[22] Jones, M. “Interposition Agents: Transparently Interposing User Code at the System Interface”. In 14th ACM Symp. On Operating Systems Principles. Asheville, NC. 1993
[23] Bershad, B., et al. Extensibility, Safety and Performance in the SPIN Operating System. In 15th ACM Symp. On Operating Systems Principles. 1995.
[24] Engler, D.R., M.F. Kaashoek, and J. O’Toole Jr. Exokernel, Operating System Architecture for Application-Level Resource Management”. In 15th ACM Symp. on Operating Systems Principles. 1995.
[25] Borenstein, N. “Email with a Mind of its Own: The Safe-Tcl Language for Enabled Mail.” In IFIP International Conference. Barcelona, Spain. 1994
[26] Gosling, J. and H. McGilton, “The Java Language Environment: A White Paper”, Sun Microsystems. 1995
[27] Gosling, J. “Java Intermediate Bytecodes”, In SIGPLAN Workshop on Intermediate Representations (IR95). San Francisco, CA. 1995