Advanced Analysis of KTM and Security Issues in Mobile Ad Hoc Networks

Authors

  • M. Zahir Ahmed  Lecturer in Physics, Department of Physics, Osmania College, Kurnool, Andhra Pradesh, India
  • Dr. Syed Nisar Ahmed  Lecturer in Physics, Department of Physics, Osmania College, Kurnool, Andhra Pradesh, India
  • Shaik Abdul Muneer  Lecturer in Physics, Department of Physics, Osmania College, Kurnool, Andhra Pradesh, India
  • H. Azhar Salam  Lecturer in Electronics, Dept. of Physics, Osmania College, Kurnool, Andhra Pradesh, India

Keywords:

Routing, non-repudiation, Byzantine failure, MANET, Security, Authentication, Integrity, Non-repudiation, Confidentiality, Key and Trust Management(KTM).

Abstract

An ad hoc Network is a new generation of network offering unrestricted mobility without any underlying infrastructure. In this kind of network, all the nodes share the responsibility of network formation and management. This paper proposes a five-layer security architecture for ad hoc networks, that provides self organized distributed security, and authenticated, security aware routing. This model has been simulated and is found to provide security with negligible overhead? Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. The performance evaluation have their place in wireless network research, the current and future applications of the ad hoc networks have forced the research community to look at dependability and security aspects as eavesdropping and jamming. To develop suitable security solutions for such new environments, we must first understand how MANETs can be attacked. This chapter provides a comprehensive survey of attacks against a specific type of target, namely the routing protocols used by MANETs. We introduce the security issues specific to MANETs and present a detailed classification of the attacks/attackers against these complex distributed systems. Then we discuss various proactive and reactive solutions proposed for MANETs. It then addresses the possible solution to protect the security mechanism, which involves availability, integrity, authentication and non repudiation. These securities related issues are well addressed if one can provide methods that are pertinent for authentication, key distribution, and intrusion detection and rerouting in case of Byzantine failure in MANETS. Depending on the application context, a user may desire various security services such as authentication, integrity, non-repudiation, Confidentiality,(KTM) Key and Trust Management and access control.

References

  1. Buchegger S., Tissieres C., Le Boudec J.-Y.,“A Test-Bed for Misbehaviour Detection in Mobile Ad-Hoc Networks –How Much Can Watchdogs Really Do?”, Mobile Computing Systems and Applications (WMCSA ’04), pp. 102-111, 2004
  2. Ning P., Sun K., “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols”, In Proc. of the IEEE Workshop on Information Assurance, pp. 60-67, 2003
  3. Stajano F., Anderson R., “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks”, In Proc. of Int. Workshop on Security Protocols, Springer, 1999 Yi P., Dai Z., Zhang S., Zhong Y., “A New Routing Attack in Mobile Ad Hoc Networks”, Int.
  4. Hattig .M, 2001, Ed., Zero-Conf IP Host Requirements, Draftietfzerofonfreqts- 09.tct, IETF MANET Working Group, August 2001.
  5. Perrig .A, Szewczyk .R, Wen .V, Culler .D, and Tygar J.D, 2001, “SPINS: security protocols for sensor networks”: Proceedings of the 7th Annual International Conference in Mobile Computing and Networks (MobiCom 2001), Rome, Italy, pp. 189–199.
  6. Basagni .S, Herrin .K, Rosti .E, and Bruschi .D, 2001, “Secure Pebble nets, in: Proceedings of 2nd MobiHoc”, Long Beach CA, October 2001, pp.156–163.
  7. Boukerche .A, El-Khatib .K, Xu .L,Korba .L, 2004, “Secure ad hoc routing protocol”, Fourth International IEEE Workshop on Wireless Local Networks. Tampa, Florida, November 2004. NRC47394.
  8. Pearlman .M. R, Haas .Z .J, Sholander .P, Tabrizi S. S,”On the impact of  lternate path routing for load balancing in mobile ad hoc networks”, Mobi HOC, 2000.
  9. Yenumula B. Reddy, RastkoSelmic. 2011, “Agentbased Trust Calculation in Wireless Sensor Networks”, SENSORCOMM 2011: The Fifth International Conference on Sensor Technologies and Applications, IARIA, pp 324-339.
  10. Wenjia Li, Anupam Joshi And Tim Finin, 2011 “ATM: Automated Trust Management For Mobile Ad-Hoc Networks Using Support Vector Machine”, In: 12th IEEE International Conference On Mobile Data Management (MDM), pp. 291–292
  11. Govindan and P. Mohapatra, 2012 “Trust computations and trust dynamics in mobile adhoc networks: A survey, ”IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 279–298.
  12.  England, P., Shi, Q., Askwith, B., Bouhafs. 2012, ” A Survey Of Trust Management In Mobile Ad-Hoc Networks “Proceedings of the 13th Annual Post Graduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting.

Downloads

Published

2017-07-31

Issue

Section

Research Articles

How to Cite

[1]
M. Zahir Ahmed, Dr. Syed Nisar Ahmed, Shaik Abdul Muneer, H. Azhar Salam, " Advanced Analysis of KTM and Security Issues in Mobile Ad Hoc Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.109-115, July-August-2017.