IJMTES – PROTECTED IMPROVEMENT OF ZHLS IN MANET USING SECURE HASHING ALGORITHM

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : PROTECTED IMPROVEMENT OF ZHLS IN MANET USING SECURE HASHING ALGORITHM

Author’s Name : Arun Raj G | Umadevi Nunnamed

Volume 03 Issue 12 2016

ISSN no:  2348-3121

Page no: 73-77

Abstract – An Ad-hoc (MANET) wireless network is a special type of wireless network in which a collection of mobile hosts with wireless network interfaces may from a temporary network, without the aid of any established infrastructure or centralized administration. The routing protocol is aimed to offer best route from source to destination in terms of energy efficiency and security. Secure Zone Based Hierarchical Link State Routing Protocol Using Digital Signature is one among in hybrid routing protocols for Mobile ad-hoc network, which is not tolerable large number of internal attacks that come from malicious nodes. A malicious node is losing the routing information, data packets intentionally and routing protocol process get disturbed. To fix this problem, we proposed a novel approach for effective key management, and prevention of malicious nodes. Security to the routing protocol is incorporated with traditional Secure Hashing Algorithm (SHA-256) symmetric and asymmetric key encryption methods. The performance of the proposed algorithm is analyzed and results shown improvement in terms of the packet delivery fraction, communication overheads and percentage of released packets. 

Keywords— MANET, ZHLS, SHA-256, Hashing, Communication Overhead, Routing Packets

Reference

  1. Liu, K., Deng, J., Varshney, P.K. and Balakrishnan, K. (2007) An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Transaction on Mobile Computing, 6, 536-550. 
  2. R.Rajamohamed, Dr. V. Rajamani, “Hashed Symmetric Key Encryption Based VBSR”, JATIT & LLS. 10thApril 2014. Vol. 62, ISSN: 1992- 86 445, pp:161-165 . S.S.Zalte et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 6916-6919
  3. Ramya K, Beaulah David, Shaheen H, “Hybrid Cryptography Algorithms for Enhanced Adaptive Acknowledgment Secure in MANET”, www.iosrjournals.org, eISSN: 2278-0661, p-ISSN: 2278- 8727, Volume 16, Issue 1, Ver.VIII (Feb. 2014), pp:32-36.
  4. Kamal Kumar Chauhan, Amit Kumar Singh Sanger, Virendra Singh Kushwah, “Securing On-Demand Source Routing in MANETs ”, IEEE Explore Digital library, 2010, pp:294-297.
  5. Gandhi Krunal A, Patel Tejal K., “Dual Digest Symmetric Key Security Scheme for AODV in MANET”,( IJCSIT), Vol. 5(4),2014, ISSN:0975- 9646, pp:5548-5552 .
  6. K.Sangeetha, “Secure Data Transmission in MANETS Using Eliptic Curve Cryptography”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Special Issue 1, March 2014, pp:2557-2562.
  7. A.Rajaram and Dr.S.Palaniswami , “A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks”,IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 5, July 2010 , ISSN-1694-0814, pp:37-45.
  8. Kimaya Sanzgiri, Daniel LaFlamme,Bridget Dahill, “Authenticate Routing for AdHoc Networks”, IEEE Xplore Digital Library,VOL. 23, NO. 3, MARCH 2005, pp:1-13.
  9. Stephan Eichler, Christian Roman, “Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC”, München, Germany, IEEE Xplore Digital Library, 8-2006.
  10. Zahra Moradlu, Mohammad Ali Doostari, Mohammed Gharib, “ Fully Distributed Self Certified Key Management for Large-Scale MANETs”, 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing on Autonomic & Trusted Computing,pp:96-102.
  11. Soma Saha , Rituparna Chaki , Nabendu Chaki , “ A New Reactive Secure Routing Protocol for Mobile Ad-Hoc Networks”, IEEE computer society(2008), pp:103-108.
  12. Tameem Eissa, Shukor Abdrazak, Md Asri Ngadi, “ Enhancing MANET Security using Secret Public Keys “2009 International Conference on Future Networks , IEEE, pp:130-134.
  13. A article on “Next Generation Encryption” , Cisco security intelligence operations, April 2014.
  14. Zahra Moradlu, Mohammad Ali Doostari, Mohammed Gharib, “ Fully Distributed Self Certified Key Management for Large-Scale MANETs”, 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing on Autonomic & Trusted Computing,pp:96-102.