Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : K.Karthick, Dr.R.Asokan

Volume 01 Issue o5  Year 2014  

ISSN no:  2348-3121  

Page no: 203-210

Abstract—Mobile ad-hoc networks (MANET’S) were originally designed for co-operative surroundings. MANET’S are assortment of mobile hosts that are able to move severally in any direction that doesn’t maintain any centralized networks. So, Manet’s are additional liable to attacks. To outline security of Manet’s some security measures like encoding rule and Intrusion detection systems are introduced. The planned approach defines the light-weight within the sense that the Intrusion Detection System (IDS) used for estimating the trust worth that one node has for one more, consumes restricted process resource. Whereas the proposed approach will be incorporated in any routing protocol. Then the trust primarily based technique is incorporated with Diffie-Hellman accustomed avoid routing overhead caused by digital signature for the secure information transfer that will increase the Performance compared to the existing system.

Keywords—Mobile Ad-hoc Networks (MANET), Trust based Technique, Diffie-Hellman Algorithm, Ad-hoc On Demand Distance Vector Routing (AODV).


[1] R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, (2012), pp. 535–541.
[2] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, (2012), pp. 659–666.
[3] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, (2011), pp. 488–494.
[4] Pedro B. Vellso, Guy Pujolle “Trust Management in Mobile Adhoc Networks Using a Scalable Maturity –Based Model “ IEEE Trans Vol 7 No 3. Sep (2010).
[5] Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in Proc. 4th IEEE Workshop Mobile Comput. Syst. Appl., (2010), pp. 3–13.
[6] D. Johnson and D. Maltz, “Dynamic Source Routing in ad hoc wireless networks,” in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181. [12] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes in MANETs,” in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, (2010), pp. 216–222.
[7] K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, “Which wireless technology for industrial wireless sensor networks? The development of OCARI technology,” IEEE Trans. Ind. Electron., Vol. 56, No. 10, pp. 4266–4278, Oct. (2009).
[8] V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks: Challenges, design principles, and technical approach,” IEEE Trans. Ind. Electron., Vol. 56, No. 10, pp. 4258–4265, Oct. (2009).
[9] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, (2008).
[10] D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,” IEEE Trans. Ind. Electron., Vol. 55, No. 7, pp. 2759–2766, Jul. (2008).
[11] J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Ind. Electron., Vol. 55, No. 4, pp. 1835–1841, Apr. (2008).
[12] L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. (2007).
[13] G.Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks routing protocol—A review,” J. Comput. Sci., Vol. 3, No. 8, pp. 574–582, (2007).
[14] K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile ad-hoc communications in AEC industry,” J. Inf. Technol. Const., vol. 9, pp. 313–323, (2004).
[15] Y. Hu, A. Perrig, and D. Johnson, “ARIADNE: A secure on-demand routing protocol for ad hoc networks,” in Proc. 8th ACM Int. Conf. Mobi Com, Atlanta, GA, (2002), pp. 12–23.
[16] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, (1996), T-37.

Full Pdf Paper-Click Here