Establishing Security in Manets Using Friend-Based Ad Hoc Routing Algorithms
Abstract
Establishing security in MANET is challenging issue in any adhoc routing protocol. Neighbor nodes do not updated their routing status and bandwidth consumption during the transmission. AODV used single chain topology so bandwidth offers single chain transmission. To establishing the secure transmission FACES provide new challenges to its neighbor. Proposed system incorporate cache update and aware of routing information this scheme that has been drawn from a network of friends in real life scenarios. This algorithm send request in the form of challenges and sharing nearby neighbor lists to provide trust worthy nodes to the source node through which data transmission finally takes place. Proposed system taking various packet sizes into their account and deals only best effort traffic and AODV used only simple priority algorithm. Due this algorithm network can easily identifies the malicious node and provide secure neighbor node detection in the mobile adhoc network.
Full Text:
PDFReferences
D. P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems. Pacific Grove, CA: Brooks/Cole, Thomson, 2002.
I. Chlamtac, M. Conti, and J.-N. Liu, ―Mobile ad-hoc networking: Imperatives and challenges,‖ in Ad-Hoc Networks. New York: Elsevier, 2003, vol. 1, pp. 13–64, No. 1.
L.Wang and N.-T. Zhang, ―Locally forwarding management in ad-hoc networks,‖ in Proc. IEEE Int. Conf. Communications, Circuits and Systems and West Sino Expositions, Jun./Jul. 2002, pp. 160–164.
D. Johnson and D. Maltz, ―Dynamic source routing in ad hoc wireless networks,‖ in Book Chapter inMobile Computing, T. Imielinski andH. Korth, Eds. Dordrecht, The Netherlands: Kluwer, 1996, pp. 131–181.
A. Wood and J. A. Stankovic, ―A taxonomy for denial-of-service attacks in wireless sensor networks,‖ in Handbook of Sensor Networks:Compact Wireless and Wired Sensing Systems. Boca Raton, FL:CRC, 2005, pp. 32:1–32:20
C. Perkins, E. Royer, and S. Das, Ad Hoc on Demand Distance Vector (AODV) Routing Jul. 2003, Internet experimental RFC 3561.
W. Diffie and M. E. Hellman, ―New directions in cryptography,‖ IEEE Trans. Inform. Theory, vol. IT-22, no. 6, pp. 644–654, 1976.
M. S. Obaidat and N. Boudriga, Security of e-Systems and Computer Networks. Cambridge, U.K.: Cambridge Univ. Press, 2007.
Refbacks
- There are currently no refbacks.