Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Enhancement of Node Authentication and Security in Mobile ADHOC Network

Author : Manohar B N 1 Suchitra V 2

Date of Publication :7th May 2016

Abstract: The wireless networks play major rule in networking field. Routing and mobility are the major problems in mobile ADHOC networks. These problems can be avoided using clustering based authentication of approaches. In these paper describes The implementations of secured node verification scheme that authenticates the true nodes to access network and detects attacker nodes and Q–LEACH based clustering so that external and internal attacks also avoided. Every node in the network can act like self originating nodes to their neighbors. So every node is builds its own IP address. The wireless networks is used in military application. The mobile adhoc network vulnerable nature not secures. Assign the authentication key for every node to achieve the energy saving of the battery. Therefore it is necessary to adapted Intrusion Detection System mechanism to prevent and detected the Network from attackers. In the other hand Enhanced Adaptive Acknowledgement is proposed as an IDS. In this paper a both IP-trace back with End-to-End Adaptive Acknowledgment getting acknowledgments or information in both ends.

Reference :

  1. [1] H. Miranda and L. Rodrigues, .Preventing selfishness in open mobile ad hoc networks,. inProc. of the Seventh CaberNetRadicals Workshop,October 2002.

    [2] YUAN XUE and KLARA NAHRSTEDT, "ProvidingFault-Tolerant Adhoc RoutingService in AdversariaIEnvironments", journal=WirelessPersonal communications29,pages=367, year=2004, publisher=Kluwer AcademicPublishers

    [3] S. D. Khatawkar, U. L. Kulkarni and K. K. Pandyaji, "Detection of Routing Misbehavior in MANETs", (201 1 ) IACSrT Press, Singapore

    [4] V. Manjula and C. Chellappan," Trust Based Node Replication Attack Detection Protocol For Wireless Sensor Networks", Journal of Computer Science 2012, 8 (1 1 ), 1 880-1888, rSSN 1 549-3636

    [5] Jianguo SHAN, Lei DONG, Xiaozhong LIAO, " Research on Improved LEACH Protocol of Wireless Sensor Networks", PRZEGLfD ELEKTROTECHNTCZNY, ISSN 0033-2097, R. 89 NR I b/2013. [6] Jianguo SHAN, Lei DONG, Xiaozhong LIAO, " Research on Improved LEACH Protocol of Wireless Sensor Networks", PRZEGLfD ELEKTROTECHNTCZNY, ISSN 0033-2097, R. 89 NR I b/2013


Recent Article