An Improved Weighted Clustering for Ad-hoc Network Security New
Basant Kuamr Verma1 , Binod Kumar22
Section:Research Paper, Product Type: Journal Paper
Volume-3 ,
Issue-3 , Page no. 51-55, Mar-2015
Online published on Mar 31, 2015
Copyright © Basant Kuamr Verma , Binod Kumar2 . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Basant Kuamr Verma , Binod Kumar2, “An Improved Weighted Clustering for Ad-hoc Network Security New,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.51-55, 2015.
MLA Style Citation: Basant Kuamr Verma , Binod Kumar2 "An Improved Weighted Clustering for Ad-hoc Network Security New." International Journal of Computer Sciences and Engineering 3.3 (2015): 51-55.
APA Style Citation: Basant Kuamr Verma , Binod Kumar2, (2015). An Improved Weighted Clustering for Ad-hoc Network Security New. International Journal of Computer Sciences and Engineering, 3(3), 51-55.
BibTex Style Citation:
@article{Verma_2015,
author = {Basant Kuamr Verma , Binod Kumar2},
title = {An Improved Weighted Clustering for Ad-hoc Network Security New},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2015},
volume = {3},
Issue = {3},
month = {3},
year = {2015},
issn = {2347-2693},
pages = {51-55},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=419},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=419
TI - An Improved Weighted Clustering for Ad-hoc Network Security New
T2 - International Journal of Computer Sciences and Engineering
AU - Basant Kuamr Verma , Binod Kumar2
PY - 2015
DA - 2015/03/31
PB - IJCSE, Indore, INDIA
SP - 51-55
IS - 3
VL - 3
SN - 2347-2693
ER -
VIEWS | XML | |
2697 | 2544 downloads | 2525 downloads |
Abstract
Wireless network technology is most frequently used network technology. A number of variants are available on the basis of traditional wireless networking such as WSN, WMN, MANET and others. In all the variants of wireless networks routing plays the essential role. Additionally the attackers are mainly targeting the routing strategies for performing the malicious activities. In order to secure the wireless ad hoc network a new kind of security system is proposed in this presented paper. The proposed security architecture provides the security against the malicious attackers namely black-hole, wormhole, grey-hole and DDOS attacks. Additionally able to improve the performance of network in normal conditions as well as under attack conditions. The given paper includes the proposed system design and the concepts that are help to support the proposed security infrastructure
Key-Words / Index Term
ad hoc network, clustered routing, implementation, simulation, performance evaluation
References
[1] Emmanouil A. Panaousis, LevonNazaryan, Christos Politis, “Securing AODV against Wormhole Attacks in Emergency MANET Multimedia Communications”, Mobimedia, London, U.K., Vol - 09, pp (7-9), Sept 2009.
[2] F. Nait-Abdesselam, B. Bensaou, and T. Taleb, “Detecting and avoiding wormhole attacks in wireless ad hoc networks”, IEEE Communications Magazine, vol. 46, no. 4, pp. (127–133), April 2008.
[3] Pratik Gite& Sanjay Thakur, “Different Security Issues Over MANET”, International Journal of Computer Science Engineering and Information Technology, Research Vol. 3, Issue 1, pp. (233-238), Mar 2013.
[4] Pankaj Solanki, Deepak Shukla, “Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms”, International Journal Of Engineering And Computer Science, Vol. - 3, Issue 2, pp. (3884-3890), February 2014.
[5] Ping Yia, , YafeiHouc, YipingZhongb, ShiyongZhangb, ZhoulinDaib, “Flooding attack and defence in Ad hoc networks”, Journal of Systems Engineering and Electronics, Vol. 17, Issue 2, pp. (410-416), June 2006.