A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network

Author(s):  
Saju P. John ◽  
Philip Samuel

Owing to the wireless and dynamic nature, MANETs are susceptible to security attacks from malicious nodes. Key management, certificate exchange and certificate revocation mechanisms play a vital role in securing the network from attacks. When the certificate of a malicious node is revoked, it is denied from all activities and isolated from the network. This paper surveys various existing mechanisms in key management and certificate exchange. Key management methods are broadly classified into two types namely, contributory and distributive methods. Here, certificate distribution and exchange techniques are classified as trust-based and non-trust based methods. Certificate revocation techniques are classified as voting-based, cluster-based and trust-based schemes. The merits and demerits of each mechanism along with the performance are analyzed. Finally, a comparison table is designed to compare the existing mechanisms in an effective manner.

Author(s):  
S. Maharaja ◽  
R. Jeyalakshmi ◽  
A.V. Sabarish Kanna ◽  
M. Deva Priya

A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. In this paper, Cohen Kappa Reliability Coefficient based Mitigation (CKRCM) mechanism is proposed to deal with these attacks. The intermediate nodes are monitored by their neighbors for a timestamp. If the monitoring node does not receive an acknowledgment, then the nodes are perceived to be attacked. The trustworthiness of the nodes is built by computing the trusts and reliabilities of the nodes. It is seen that the proposed scheme outperforms the existing scheme in terms of Throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR).


2015 ◽  
Vol 8 (S2) ◽  
pp. 151
Author(s):  
Y. Haripriya ◽  
K. V. Bindu Pavani ◽  
S. Lavanya ◽  
V. Madhu Viswanatham

2018 ◽  
Vol 7 (3.6) ◽  
pp. 394
Author(s):  
Reshmi G.Nair ◽  
Kumar Narayanan

Based on dynamic network topology, mobile Adhoc Networks (MANET) plays a vital role. Mobility is one of the major issues in MANET which affects the quality of routing and disconnects in the route frequently. It is necessary to avoid interruptions in routing and provide a continuous connectivity among nodes to improve the routing ability in this situation. It is important to predict the present location information of the nodes since route failure and interruptions are caused by node mobility. To compare and predict the pattern of mobile nodes using flies flash patterns, this paper utilizes a Nature-inspired algorithm as Fire Fly Algorithm. Among mobile nodes, this can able to allocate the available resources and increase the routing quality. The Firefly algorithm is simulated in network simulation software and the obtained results are verified. The performance of the proposed algorithm is evaluated by comparing the results with the other existing systems’ results.  


2018 ◽  
Vol 7 (2.20) ◽  
pp. 302
Author(s):  
Bharathisindhu P ◽  
Dr S.SelvaBrunda

Wireless technologies increasingly exist everywhere in advanced networks; however, this new innovation accompanies its own set of challenges. The nodes in the wireless network are characteristically ‘open’ and viewable by all network scanners. Networks are protected using many firewalls and encryption software’s. Firewalls restrict access between networks to prevent intrusion and do not indicate an attack within the network. An Intrusion Detection System (IDS) is required which monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. In this paper, we propose a probability based IDS model that provides generalized solution to detect set of malicious nodes to improve the detection speed and accuracy. 


Author(s):  
Gurpreet Singh, Ganpat Joshi

The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.


Sign in / Sign up

Export Citation Format

Share Document