IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET173422                                                     


Advanced Analysis of KTM and Security Issues in Mobile Ad Hoc Networks

Authors(4):

M. Zahir Ahmed, Dr. Syed Nisar Ahmed, Shaik Abdul Muneer, H. Azhar Salam
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
An ad hoc Network is a new generation of network offering unrestricted mobility without any underlying infrastructure. In this kind of network, all the nodes share the responsibility of network formation and management. This paper proposes a five-layer security architecture for ad hoc networks, that provides self organized distributed security, and authenticated, security aware routing. This model has been simulated and is found to provide security with negligible overhead? Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. The performance evaluation have their place in wireless network research, the current and future applications of the ad hoc networks have forced the research community to look at dependability and security aspects as eavesdropping and jamming. To develop suitable security solutions for such new environments, we must first understand how MANETs can be attacked. This chapter provides a comprehensive survey of attacks against a specific type of target, namely the routing protocols used by MANETs. We introduce the security issues specific to MANETs and present a detailed classification of the attacks/attackers against these complex distributed systems. Then we discuss various proactive and reactive solutions proposed for MANETs. It then addresses the possible solution to protect the security mechanism, which involves availability, integrity, authentication and non repudiation. These securities related issues are well addressed if one can provide methods that are pertinent for authentication, key distribution, and intrusion detection and rerouting in case of Byzantine failure in MANETS. Depending on the application context, a user may desire various security services such as authentication, integrity, non-repudiation, Confidentiality,(KTM) Key and Trust Management and access control.

M. Zahir Ahmed, Dr. Syed Nisar Ahmed, Shaik Abdul Muneer, H. Azhar Salam

Routing, non-repudiation, Byzantine failure, MANET, Security, Authentication, Integrity, Non-repudiation, Confidentiality, Key and Trust Management(KTM).

  1. Buchegger S., Tissieres C., Le Boudec J.-Y.,“A Test-Bed for Misbehaviour Detection in Mobile Ad-Hoc Networks –How Much Can Watchdogs Really Do?”, Mobile Computing Systems and Applications (WMCSA ’04), pp. 102-111, 2004
  2. Ning P., Sun K., “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols”, In Proc. of the IEEE Workshop on Information Assurance, pp. 60-67, 2003
  3. Stajano F., Anderson R., “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks”, In Proc. of Int. Workshop on Security Protocols, Springer, 1999 Yi P., Dai Z., Zhang S., Zhong Y., “A New Routing Attack in Mobile Ad Hoc Networks”, Int.
  4. Hattig .M, 2001, Ed., Zero-Conf IP Host Requirements, Draftietfzerofonfreqts- 09.tct, IETF MANET Working Group, August 2001.
  5. Perrig .A, Szewczyk .R, Wen .V, Culler .D, and Tygar J.D, 2001, “SPINS: security protocols for sensor networks”: Proceedings of the 7th Annual International Conference in Mobile Computing and Networks (MobiCom 2001), Rome, Italy, pp. 189–199.
  6. Basagni .S, Herrin .K, Rosti .E, and Bruschi .D, 2001, “Secure Pebble nets, in: Proceedings of 2nd MobiHoc”, Long Beach CA, October 2001, pp.156–163.
  7. Boukerche .A, El-Khatib .K, Xu .L,Korba .L, 2004, “Secure ad hoc routing protocol”, Fourth International IEEE Workshop on Wireless Local Networks. Tampa, Florida, November 2004. NRC47394.
  8. Pearlman .M. R, Haas .Z .J, Sholander .P, Tabrizi S. S,”On the impact of  lternate path routing for load balancing in mobile ad hoc networks”, Mobi HOC, 2000.
  9. Yenumula B. Reddy, RastkoSelmic. 2011, “Agentbased Trust Calculation in Wireless Sensor Networks”, SENSORCOMM 2011: The Fifth International Conference on Sensor Technologies and Applications, IARIA, pp 324-339.
  10. Wenjia Li, Anupam Joshi And Tim Finin, 2011 “ATM: Automated Trust Management For Mobile Ad-Hoc Networks Using Support Vector Machine”, In: 12th IEEE International Conference On Mobile Data Management (MDM), pp. 291–292
  11. Govindan and P. Mohapatra, 2012 “Trust computations and trust dynamics in mobile adhoc networks: A survey, ”IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 279–298.
  12.  England, P., Shi, Q., Askwith, B., Bouhafs. 2012, ” A Survey Of Trust Management In Mobile Ad-Hoc Networks “Proceedings of the 13th Annual Post Graduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting.

Publication Details

Published in : Volume 3 | Issue 5 | July-August - 2017
Date of Publication Print ISSN Online ISSN
2017-07-31 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
109-115 IJSRSET173422   Technoscience Academy

Cite This Article

M. Zahir Ahmed, Dr. Syed Nisar Ahmed, Shaik Abdul Muneer, H. Azhar Salam, "Advanced Analysis of KTM and Security Issues in Mobile Ad Hoc Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.109-115, July-August-2017.
URL : http://ijsrset.com/IJSRSET173422.php