scholarly journals DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network

Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.

2021 ◽  
Author(s):  
Ashutosh Srivast ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

Abstract Mobile Ad-hoc Networks (MANETs) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered viz. secure acknowledgment, node authentication and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely, Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


2020 ◽  
Author(s):  
Ashutosh Srivast ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

Abstract Mobile Ad-hoc Networks (MANETs) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered viz. secure acknowledgment, node authentication and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely, Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


2014 ◽  
Vol 644-650 ◽  
pp. 2838-2841
Author(s):  
Ping Zong ◽  
Jun Qin

With the growth of multimedia business demand in commercial applications, providing QoS support in Ad Hoc network is more and more important. With the appearance of the business which has strict requirements on the QoS, to provide QoS guarantee in mobile Ad Hoc network will have more important significance. By researching the QoS guarantee mechanism research status of wireless Ad Hoc network, as well as the existing research results and the analysis of the problems remaining to be solved, this paper puts forward a new QoS routing protocol named ProDSR, which adds QoS guarantee mechanism extension to the dynamic source routing protocol (DSR). This protocol makes bandwidth, stability and hop count to be selection criteria for providing QoS guarantee, effectively improves the service quality of mobile Ad Hoc network.


Mobile Ad hoc Network (MANET) is essentially a framework much less network. It carries out certainly not demand any kind of predetermined network. Every nodule is serving as a recipient and also a transmitter. All the nodules in the MANET are essentially taken on as functioning within a welcoming as well as collaborative network circumstance. There is essentially no base station to handle the relocating gadgets. There is essentially no safety to guard the nodules. Any kind of nodule may function as a misbehaving nodule. Such uncooperative habits may significantly diminish network efficiency as well as might also cause complete interaction failure. The destructive nodules may effortlessly assault the mobile nodules. In this particular newspaper, our experts have essentially suggested an Intrusion Detection System through which the harmful nodules are essentially spotted and also certainly there due to the functionality of the network are going to be essentially raised.


Sign in / Sign up

Export Citation Format

Share Document